Sciweavers

12 search results - page 1 / 3
» icisc 2009
Sort
View
ICISC
2009
140views Cryptology» more  ICISC 2009»
13 years 2 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 2 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 2 months ago
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 2 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 2 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...