Sciweavers

20175 search results - page 65 / 4035
» Is abstraction the key to computing
Sort
View
108
Voted
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
15 years 7 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
ADBIS
2010
Springer
145views Database» more  ADBIS 2010»
14 years 10 months ago
Faceoff: Surrogate vs. Natural Keys
Abstract. The natural and surrogate key architectures are two competing approaches to specifying keys in relational databases. We analyze the performance of these approaches with r...
Slavica Aleksic, Milan Celikovic, Sebastian Link, ...
79
Voted
KES
2005
Springer
15 years 6 months ago
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the exp...
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk...
78
Voted
CRYPTO
1995
Springer
101views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Robustness Principles for Public Key Protocols
Abstract: We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help at...
Ross J. Anderson, Roger M. Needham
106
Voted
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
14 years 10 months ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung