Sciweavers

1825 search results - page 276 / 365
» Cryptographic Securities Exchanges
Sort
View
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
15 years 3 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
15 years 1 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...
DAGSTUHL
2007
15 years 1 months ago
CodeVoting: protecting against malicious vote manipulation at the voter's PC
Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolle...
Rui Joaquim, Carlos Ribeiro
ASIAN
2009
Springer
299views Algorithms» more  ASIAN 2009»
15 years 1 months ago
Deducibility Constraints
In their work on tractable deduction systems, D. McAllester and later D. Basin and H. Ganzinger have identified a property of inference systems (the locality property) that ensures...
Sergiu Bursuc, Hubert Comon-Lundh, Stéphani...
SIGCOMM
2010
ACM
15 years 3 days ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...