148
click to vote
ACISP
15 years 6 months ago
2006 Springer
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
130
Voted
ACISP
15 years 8 months ago
2006 Springer
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
99
Voted
ACISP
15 years 8 months ago
2006 Springer 154
Voted
ACISP
15 years 8 months ago
2006 Springer
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
133
Voted
ACISP
15 years 6 months ago
2006 Springer
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
|