Sciweavers

319 search results - page 25 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
ASIACRYPT
2009
Springer
15 years 4 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
CDC
2009
IEEE
106views Control Systems» more  CDC 2009»
15 years 2 months ago
Rendezvous with multiple, intermittent leaders
Abstract— In this paper we study bipartite, first ordernetworks where the nodes take on leader or follower roles. In particular, we let the leaders’ positions be static and as...
Giuseppe Notarstefano, Magnus Egerstedt, Musad Haq...
AI
2007
Springer
14 years 9 months ago
Multi-agent learning for engineers
As suggested by the title of Shoham, Powers, and Grenager’s position paper [34], the ultimate lens through which the multi-agent learning framework should be assessed is “what...
Shie Mannor, Jeff S. Shamma
EUROCRYPT
2001
Springer
15 years 2 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
ISCC
2007
IEEE
15 years 4 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto