Sciweavers

6 search results - page 1 / 2
» iwsec 2009
Sort
View
IWSEC
2009
Springer
14 years 26 days ago
Bit-Free Collision: Application to APOP Attack
Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
IWSEC
2009
Springer
14 years 26 days ago
Reducing Complexity Assumptions for Oblivious Transfer
Reducing the minimum assumptions needed to construct various cryptographic primitives is an important and interesting task in theoretical cryptography. Oblivious Transfer, one of ...
K. Y. Cheong, Takeshi Koshiba
30
Voted
IWSEC
2009
Springer
14 years 26 days ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
IWSEC
2009
Springer
14 years 26 days ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
IWSEC
2009
Springer
14 years 26 days ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto