150
click to vote
CANS
15 years 5 months ago
2008 Springer
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
115
click to vote
CANS
15 years 5 months ago
2008 Springer
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
122
click to vote
CANS
15 years 5 months ago
2008 Springer
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
143
click to vote
CANS
15 years 5 months ago
2008 Springer
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
180
click to vote
CANS
15 years 5 months ago
2008 Springer
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
|