Sciweavers

362 search results - page 25 / 73
» Extending the Resynchronization Attack
Sort
View
WECWIS
2005
IEEE
86views ECommerce» more  WECWIS 2005»
15 years 9 months ago
The Evolution of Cooperation under Cheap Pseudonyms
A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the...
Michal Feldman, John Chuang
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
15 years 5 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
MEDIAFORENSICS
2010
15 years 5 months ago
Sensor noise camera identification: countering counter-forensics
In camera identification using sensor noise, the camera that took a given image can be determined with high certainty by establishing the presence of the camera's sensor fing...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen
CISC
2009
Springer
181views Cryptology» more  CISC 2009»
15 years 1 months ago
Cryptanalysis of the ESSENCE Family of Hash Functions
Abstract. ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on ESSENCE....
Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson...
IFIP
2009
Springer
15 years 10 months ago
Probable Innocence in the Presence of Independent Knowledge
Abstract. We analyse the C anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Und...
Sardaouna Hamadou, Catuscia Palamidessi, Vladimiro...