Sciweavers

2237 search results - page 28 / 448
» On the Security of Random Sources
Sort
View
NCA
2006
IEEE
15 years 3 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
85
Voted
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
15 years 1 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
92
Voted
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
15 years 3 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
71
Voted
ACISP
2006
Springer
15 years 1 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 3 months ago
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Abstract. We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard crypto...
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda...