Sciweavers

20175 search results - page 13 / 4035
» Is abstraction the key to computing
Sort
View
121
Voted
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 29 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
WIOPT
2006
IEEE
15 years 6 months ago
A general probabilistic model for improving key assignment in wireless networks
Abstract— We study the problem of establishing secure communication channels in resource-constrained wireless networks using key predistribution. Pairwise communication channels ...
Patrick Tague, Radha Poovendran
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
81
Voted
VC
2010
182views more  VC 2010»
14 years 10 months ago
Color invariant chroma keying and color spill neutralization for dynamic scenes and cameras
Abstract In this article we show, how temporal backdrops that alternately change their color rapidly at recording rate can aid chroma keying by transforming color spill into a neut...
Anselm Grundhöfer, Daniel Kurz, Sebastian Thi...
90
Voted
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 4 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...