228
click to vote
ACISP
10 years 15 days ago
2015 Springer
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and ...
159
Voted
ACISP
10 years 15 days ago
2015 Springer
The Whirlwind hash function, which outputs a 512-bit digest, was designed by Barreto et al. and published by Design, Codes and Cryptography in 2010. In this paper, we provide a tho...
128
click to vote
ACISP
10 years 15 days ago
2015 Springer
Ring signature enables an user to anonymously sign a message on behalf of a group of users termed as ‘ring’ formed in an ‘ad-hoc’ manner. A naive scheme produces a signatur...
128
click to vote
ACISP
10 years 15 days ago
2015 Springer
In cryptography, forward secrecy is a well-known property for key agreement protocols. It ensures that a session key will remain private even if one of the long-term secret keys is...
119
click to vote
ACISP
10 years 15 days ago
2015 Springer
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for passwor...
|