Sciweavers

631 search results - page 116 / 127
» Intrusion-Resilient Secure Channels
Sort
View
EUROCRYPT
2009
Springer
16 years 9 days ago
A Leakage-Resilient Mode of Operation
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to ? but weaker than ? a pseudorandom function: for wPRFs one only requires that the output is pseudorandom...
Krzysztof Pietrzak
114
Voted
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 8 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
85
Voted
CHI
2004
ACM
16 years 2 days ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 6 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...