Sciweavers

659 search results - page 31 / 132
» Compiling and securing cryptographic protocols
Sort
View
121
Voted
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
15 years 10 days ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
106
Voted
CSFW
1998
IEEE
15 years 4 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
110
Voted
CORR
2006
Springer
125views Education» more  CORR 2006»
15 years 13 days ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski
JCST
2008
128views more  JCST 2008»
15 years 12 days ago
t-Private and t-Secure Auctions
In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one is interested in hiding th...
Markus Hinkelmann, Andreas Jakoby, Peer Stechert
89
Voted
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
15 years 6 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu