Sciweavers

515 search results - page 20 / 103
» Secure Parameters for SWIFFT
Sort
View
ICALP
2005
Springer
15 years 7 months ago
Single-Key AIL-MACs from Any FIL-MAC
Abstract. We investigate a general paradigm for constructing arbitraryinput-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency para...
Ueli M. Maurer, Johan Sjödin
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
15 years 5 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
CONEXT
2005
ACM
15 years 3 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati
AGENTS
2000
Springer
15 years 6 months ago
Verbal communication: using approximate sound propagation to design an inter-agents communication language
In this paper, we will present a method for generating conversations between human-like agents by proposing specific parameters for inter-agents messages with an approximation of...
Jean-Sébastien Monzani, Daniel Thalmann
EUROCRYPT
2000
Springer
15 years 5 months ago
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is uncondit...
Paul Dumais, Dominic Mayers, Louis Salvail