Sciweavers

13 search results - page 1 / 3
» sacrypt 2004
Sort
View
74
Voted
SACRYPT
2004
Springer
106views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
Product Construction of Key Distribution Schemes for Sensor Networks
Ruizhong Wei, Jiang Wu
67
Voted
SACRYPT
2004
Springer
15 years 3 months ago
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
Duong Hieu Phan, David Pointcheval
63
Voted
SACRYPT
2004
Springer
135views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
An Improved Correlation Attack on A5/1
Alexander Maximov, Thomas Johansson, Steve Babbage
59
Voted
SACRYPT
2004
Springer
15 years 3 months ago
Modular Number Systems: Beyond the Mersenne Family
Jean-Claude Bajard, Laurent Imbert, Thomas Plantar...
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel