Sciweavers

12 search results - page 1 / 3
» icisc 2009
Sort
View
ICISC
2009
140views Cryptology» more  ICISC 2009»
14 years 10 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson
ICISC
2009
120views Cryptology» more  ICISC 2009»
14 years 10 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
ICISC
2009
120views Cryptology» more  ICISC 2009»
14 years 10 months ago
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi
ICISC
2009
138views Cryptology» more  ICISC 2009»
14 years 10 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
ICISC
2009
138views Cryptology» more  ICISC 2009»
14 years 10 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...