Sciweavers

CANS
2006
Springer
84views Cryptology» more  CANS 2006»
13 years 6 months ago
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks
Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Z...
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
13 years 8 months ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
CANS
2006
Springer
90views Cryptology» more  CANS 2006»
13 years 8 months ago
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps
We propose a new computational complexity assumption from bilinear map, based on which we construct Verifier-Local Revocation group signatures with shorter lengths than previous on...
Sujing Zhou, Dongdai Lin
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 8 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
13 years 8 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
13 years 8 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
13 years 8 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel