Sciweavers

1019 search results - page 33 / 204
» Cryptographic Design Vulnerabilities
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 3 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
93
Voted
CSFW
2009
IEEE
15 years 1 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
SCN
2008
Springer
131views Communications» more  SCN 2008»
14 years 9 months ago
CLL: A Cryptographic Link Layer for Local Area Networks
Abstract. Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive security mechanisms, and thus give way for a pl...
Yves Igor Jerschow, Christian Lochert, Björn ...
AINA
2005
IEEE
15 years 3 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
79
Voted
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
14 years 11 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...