Sciweavers

620 search results - page 57 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...
ICTAC
2004
Springer
15 years 3 months ago
Switched Probabilistic I/O Automata
A switched probabilistic I/O automaton is a special kind of probabilistic I/O automaton (PIOA), enriched with an explicit mechanism to exchange control with its environment. Every ...
Ling Cheung, Nancy A. Lynch, Roberto Segala, Frits...
IWCM
2004
Springer
15 years 3 months ago
Complex Motion in Environmental Physics and Live Sciences
Abstract Image sequence processing techniques are an essential tool for the experimental investigation of dynamical processes such as exchange, growth, and transport processes. The...
Bernd Jähne
CONEXT
2007
ACM
15 years 1 months ago
Experimenting with real-life opportunistic communications using windows mobile devices
Pocket Switched Networks (PSN) is a novel communication paradigm which aims to exploit the opportunistic contacts between mobile devices to exchange data over multiple hops. A key...
Anna Kaisa Pietiläinen, Christophe Diot
CSFW
1995
IEEE
15 years 1 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe