Sciweavers

9 search results - page 1 / 2
» scn 2004
Sort
View
SCN
2004
Springer
13 years 10 months ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval
SCN
2008
Springer
141views Communications» more  SCN 2008»
13 years 4 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...
SCN
2004
Springer
121views Communications» more  SCN 2004»
13 years 10 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
SCN
2004
Springer
112views Communications» more  SCN 2004»
13 years 10 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg