Sciweavers

1562 search results - page 16 / 313
» Mathematics, Cryptology, Security
Sort
View
ASIACRYPT
2008
Springer
15 years 1 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 6 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
74
Voted
CRYPTO
2004
Springer
87views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Security, Liberty, and Electronic Communications
Susan Landau