135
click to vote
CANS
15 years 3 months ago
2008 Springer
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
103
click to vote
CANS
15 years 3 months ago
2008 Springer
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
107
click to vote
CANS
15 years 3 months ago
2008 Springer
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
134
click to vote
CANS
15 years 3 months ago
2008 Springer
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
159
click to vote
CANS
15 years 3 months ago
2008 Springer
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
|