Sciweavers

1769 search results - page 178 / 354
» Cryptography
Sort
View
127
Voted
ACNS
2005
Springer
124views Cryptology» more  ACNS 2005»
15 years 9 months ago
Building Reliable Mix Networks with Fair Exchange
In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anon...
Michael K. Reiter, XiaoFeng Wang, Matthew Wright
117
Voted
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 9 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
130
Voted
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 9 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
132
Voted
CHES
2005
Springer
80views Cryptology» more  CHES 2005»
15 years 9 months ago
Successfully Attacking Masked AES Hardware Implementations
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...
192
Voted
CHES
2005
Springer
170views Cryptology» more  CHES 2005»
15 years 9 months ago
Design of Testable Random Bit Generators
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...
Marco Bucci, Raimondo Luzzi