Sciweavers

8 search results - page 2 / 2
» adis 2001
Sort
View
ECIS
2001
13 years 6 months ago
Frameworks to Support E-Business Growth Strategy
It has been almost three decades since Nolan proposed his stages hypothesis. Since then several studies on the stages of growth theory appeared in the academic literature. Despite...
Adi Prananto, Judy McKay, Peter Marshall
ASIACRYPT
2001
Springer
13 years 9 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
13 years 9 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir