Sciweavers

20175 search results - page 68 / 4035
» Is abstraction the key to computing
Sort
View
119
Voted
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 4 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
110
Voted
ICISC
2000
102views Cryptology» more  ICISC 2000»
15 years 1 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
100
Voted
FSE
2008
Springer
117views Cryptology» more  FSE 2008»
15 years 2 months ago
Efficient Reconstruction of RC4 Keys from Internal States
Abstract. In this paper we present an efficient algorithm for the retrieval of the RC4 secret key, given an internal state. This algorithm is several orders of magnitude faster tha...
Eli Biham, Yaniv Carmeli
100
Voted
ICISC
1998
99views Cryptology» more  ICISC 1998»
15 years 1 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park
CORR
2011
Springer
224views Education» more  CORR 2011»
14 years 7 months ago
A Broadcast Approach To Secret Key Generation Over Slow Fading Channels
Abstract—A secret-key generation scheme based on a layered broadcasting strategy is introduced for slow-fading channels. In the model considered, Alice wants to share a key with ...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...