Sciweavers

2967 search results - page 443 / 594
» Cryptology
Sort
View
WCC
2005
Springer
197views Cryptology» more  WCC 2005»
15 years 11 months ago
Linear Filtering of Nonlinear Shift-Register Sequences
Nonlinear n-stage feedback shift-register sequences over the finite field Fq of period qn − 1 are investigated under linear operations on sequences. We prove that all members o...
Berndt M. Gammel, Rainer Göttfert
WCC
2005
Springer
122views Cryptology» more  WCC 2005»
15 years 11 months ago
Frequency/Time Hopping Sequences with Large Linear Complexities
In this paper, we discuss some methods of constructing frequency/time hopping (FH/TH) sequences over GF(pk ) by taking successive k-tuples of given sequences over GF(p). We are abl...
Yun-Pyo Hong, Hong-Yeop Song
WCC
2005
Springer
140views Cryptology» more  WCC 2005»
15 years 11 months ago
Constructions of Complementary Sequences for Power-Controlled OFDM Transmission
We present constructions of polyphase sequences suitable for the use as codewords in orthogonal frequency-division multiplexing (OFDM) with strictly bounded peak-to-mean envelope p...
Kai-Uwe Schmidt, Adolf Finger
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 11 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
ACNS
2004
Springer
284views Cryptology» more  ACNS 2004»
15 years 11 months ago
SQLrand: Preventing SQL Injection Attacks
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Stephen W. Boyd, Angelos D. Keromytis