Sciweavers

1085 search results - page 160 / 217
» A Timing Attack on RC5
Sort
View
ICVS
2003
Springer
15 years 3 months ago
Automatic Video Interpretation: A Recognition Algorithm for Temporal Scenarios Based on Pre-compiled Scenario Models
This paper presents a new scenario recognition algorithm for Video Interpretation. We represent a scenario model with the characters involved in the scenario, with its sub-scenario...
Van-Thinh Vu, François Brémond, Moni...
IPOM
2009
Springer
15 years 2 months ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
15 years 2 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
ASIACRYPT
1998
Springer
15 years 2 months ago
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
Rijmen and Preneel recently proposed for the rst time a family of trapdoor block ciphers 8]. In this family of ciphers, a trapdoor is hidden in S-boxes and is claimed to be undetec...
Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
15 years 1 months ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto