Sciweavers

COMPSEC
2000
117views more  COMPSEC 2000»
13 years 4 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
FSE
2006
Springer
94views Cryptology» more  FSE 2006»
13 years 8 months ago
Resynchronization Attacks on WG and LEX
WG and LEX are two stream ciphers submitted to eStream
Hongjun Wu, Bart Preneel