Sciweavers

1054 search results - page 9 / 211
» Secret Communication with Feedback
Sort
View
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
15 years 1 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol
ESAS
2007
Springer
15 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ASIACRYPT
2004
Springer
15 years 3 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
VTC
2008
IEEE
102views Communications» more  VTC 2008»
15 years 4 months ago
CQI Feedback Reduction Based on Spatial Correlation in OFDMA System
— In OFDMA systems, channel quality information (CQI) feedback is used to determine the modulation and coding level of a mobile station (MS). When the MS uses diversity, it trans...
Woongsup Lee, Dong-Ho Cho
FOCS
2007
IEEE
15 years 4 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak