Sciweavers

1834 search results - page 98 / 367
» Public Key Cryptography
Sort
View
119
Voted
FSE
2007
Springer
153views Cryptology» more  FSE 2007»
15 years 9 months ago
A New Attack on 6-Round IDEA
IDEA is a 64-bit block cipher with 128-bit keys introduced
Eli Biham, Orr Dunkelman, Nathan Keller
139
Voted
COCOON
2008
Springer
15 years 5 months ago
Visual Cryptography on Graphs
In this paper, we consider a new visual cryptography scheme that allows for sharing of multiple secret images on graphs: we are given an arbitrary graph (V, E) where every node an...
Steve Lu, Daniel Manchala, Rafail Ostrovsky
115
Voted
ENTCS
2007
129views more  ENTCS 2007»
15 years 3 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
146
Voted
SPW
2000
Springer
15 years 7 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 10 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...