Sciweavers

4438 search results - page 86 / 888
» On the Distribution of Keys by Hashing
Sort
View
IEICET
2008
66views more  IEICET 2008»
14 years 11 months ago
Impersonation Attack on a Strong ID-Based Key Distribution
Jung Yeon Hwang, Jongin Lim, Dong Hoon Lee
CORR
2010
Springer
45views Education» more  CORR 2010»
14 years 9 months ago
Device-independent quantum key distribution
Esther Hänggi
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 6 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
EUROCRYPT
2000
Springer
15 years 3 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup