Sciweavers

ACISP
2008
Springer
13 years 11 months ago
Non-linear Reduced Round Attacks against SHA-2 Hash Family
Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE ’08, ...
Somitra Kumar Sanadhya, Palash Sarkar
ACISP
2008
Springer
13 years 11 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
ACISP
2008
Springer
13 years 11 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
ACISP
2008
Springer
13 years 11 months ago
Distributed Verification of Mixing - Local Forking Proofs Model
Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski