Sciweavers

20175 search results - page 115 / 4035
» Is abstraction the key to computing
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 4 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
AINA
2006
IEEE
15 years 6 months ago
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks
Design of protocols for mobile ad-hoc networks (MANETs) is generally tricky compared to wired networks, because on the one hand the increased communication constraints given by th...
Lijun Liao, Mark Manulis
134
Voted
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 6 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
107
Voted
EUROCRYPT
2008
Springer
15 years 2 months ago
Key Recovery on Hidden Monomial Multivariate Schemes
Abstract. The problem we study in this paper is the key recovery problem on the C schemes and generalizations where the quadratic monomial of C (the product of two linear monomials...
Pierre-Alain Fouque, Gilles Macario-Rat, Jacques S...