Sciweavers

35 search results - page 3 / 7
» scn 2008
Sort
View
SCN
2008
Springer
103views Communications» more  SCN 2008»
13 years 5 months ago
Full Cryptanalysis of LPS and Morgenstern Hash Functions
Collisions in the LPS cryptographic hash function of Charles, Goren and Lauter have been found by Z
Christophe Petit, Kristin Lauter, Jean-Jacques Qui...
SCN
2008
Springer
128views Communications» more  SCN 2008»
13 years 5 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 5 months ago
A New DPA Countermeasure Based on Permutation Tables
Abstract. We propose and analyse a new countermeasure against Differential Power Analysis (DPA) for the AES encryption algorithm, based on permutation tables. As opposed to existin...
Jean-Sébastien Coron
TCOM
2010
108views more  TCOM 2010»
13 years 3 months ago
On the condition number distribution of complex wishart matrices
Abstract—This paper investigates the distribution of the condition number of complex Wishart matrices. Two closely related measures are considered: the standard condition number ...
Michail Matthaiou, Matthew R. McKay, Peter J. Smit...
SCN
2008
Springer
13 years 5 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...