Sciweavers

713 search results - page 93 / 143
» Dispersing Hash Functions
Sort
View
ATC
2009
Springer
15 years 1 months ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen
EUC
2007
Springer
15 years 1 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
SIGCOMM
2000
ACM
15 years 1 months ago
Trajectory sampling for direct traffic observation
Traffic measurement is a critical component for the control and engineering of communication networks. We argue that traffic measurement should make it possible to obtain the spati...
Nick G. Duffield, Matthias Grossglauser
ASIACRYPT
2010
Springer
14 years 7 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...
CODCRY
2011
Springer
242views Cryptology» more  CODCRY 2011»
14 years 1 months ago
Faster 2-Regular Information-Set Decoding
Fix positive integers B and w. Let C be a linear code over F2 of length Bw. The 2-regular-decoding problem is to find a nonzero codeword consisting of w length-B blocks, each of w...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...