Sciweavers

Share
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
8 years 5 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
8 years 5 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
CANS
2008
Springer
88views Cryptology» more  CANS 2008»
8 years 5 months ago
Unconditionally Reliable Message Transmission in Directed Hypergraphs
Kannan Srinathan, Arpita Patra, Ashish Choudhary, ...
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
8 years 5 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
8 years 5 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
CANS
2008
Springer
98views Cryptology» more  CANS 2008»
8 years 5 months ago
Counting Method for Multi-party Computation over Non-abelian Groups
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computation over nonAbelian groups. The function to be computed is fG(x1, . . . , x...
Youming Qiao, Christophe Tartary
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
8 years 5 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
8 years 5 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
CANS
2008
Springer
198views Cryptology» more  CANS 2008»
8 years 5 months ago
3D: A Three-Dimensional Block Cipher
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Jorge Nakahara Jr.
books