Sciweavers

1769 search results - page 182 / 354
» Cryptography
Sort
View
130
Voted
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 9 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
142
Voted
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
15 years 9 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...
176
Voted
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 9 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
131
Voted
HIP
2005
Springer
124views Cryptology» more  HIP 2005»
15 years 9 months ago
How Much Assurance Does a PIN Provide?
Abstract. We would like to quantify the assurance contained in an authentication secret. For instance, how much assurance does a customer convey to a bank by revealing that his Per...
Jon Louis Bentley, Colin Mallows
115
Voted
ICCSA
2005
Springer
15 years 9 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...