Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks (Englisch)
- Neue Suche nach: Li, X.
- Neue Suche nach: Wang, P.
- Neue Suche nach: Li, B.
- Neue Suche nach: Sun, Z.
- Neue Suche nach: Li, X.
- Neue Suche nach: Wang, P.
- Neue Suche nach: Li, B.
- Neue Suche nach: Sun, Z.
- Neue Suche nach: Lin, Dongdai
- Neue Suche nach: Xu, Shouhuai
- Neue Suche nach: Yung, Moti
In:
Informationn security and cryptology
8567
;
395-406
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
-
Beteiligte:Li, X. ( Autor:in ) / Wang, P. ( Autor:in ) / Li, B. ( Autor:in ) / Sun, Z. ( Autor:in ) / Lin, Dongdai / Xu, Shouhuai / Yung, Moti
-
Kongress:International conference; 9th, Informationn security and cryptology ; 2013 ; Guangzhou, China
-
Erschienen in:Informationn security and cryptology , 8567 ; 395-406LECTURE NOTES IN COMPUTER SCIENCE , 8567 ; 395-406
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:12 pages
-
Anmerkungen:Based on those presented at the conference. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
A Note on Semi-bent and Hyper-bent Boolean FunctionsTang, C. / Lou, Y. / Qi, Y. / Xu, M. / Guo, B. et al. | 2014
- 22
-
New Construction of Differentially 4-Uniform BijectionsCarlet, C. / Tang, D. / Tang, X. / Liao, Q. et al. | 2014
- 39
-
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential AttacksSun, S. / Hu, L. / Song, L. / Xie, Y. / Wang, P. et al. | 2014
- 55
-
On the Key-Stream Periods Probability of Edon80Xu, Y. et al. | 2014
- 70
-
Cube Theory and Stable k-Error Linear Complexity for Periodic SequencesZhou, J. / Liu, W. / Zhou, G. et al. | 2014
- 86
-
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z~p~qGong, X. / Zhang, B. / Feng, D. / Yan, T. et al. | 2014
- 101
-
Automatic Detection and Analysis of Encrypted Messages in MalwareZhao, R. / Gu, D. / Li, J. / Zhang, Y. et al. | 2014
- 118
-
EAdroid: Providing Environment Adaptive Security for Android SystemLiang, H. / Dong, Y. / Wang, B. / Liu, S. et al. | 2014
- 132
-
Supervised Usage of Signature Creation DevicesKubiak, P. / Kutylowski, M. et al. | 2014
- 150
-
A Practical Attack on Patched MIFARE ClassicChiu, Y.-H. / Hong, W.-C. / Chou, L.-P. / Ding, J. / Yang, B.-Y. / Cheng, C.-M. et al. | 2014
- 167
-
Omega Pairing on Hyperelliptic CurvesChen, S. / Wang, K. / Lin, D. / Wang, T. et al. | 2014
- 185
-
Pairing Computation on Edwards Curves with High-Degree TwistsLi, L. / Wu, H. / Zhang, F. et al. | 2014
- 201
-
The Gallant-Lambert-Vanstone Decomposition RevisitedHu, Z. / Xu, M. et al. | 2014
- 217
-
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR ProcessorsLiu, Z. / Grossschadl, J. / Wong, D.S. et al. | 2014
- 239
-
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key AgreementZhang, L. / Wu, Q. / Domingo-Ferrer, J. / Qin, B. / Chow, S.S.M. / Shi, W. et al. | 2014
- 255
-
Security Model and Analysis of FHMQV, RevisitedLiu, S. / Sakurai, K. / Weng, J. / Zhang, F. / Zhao, Y. et al. | 2014
- 270
-
RSA-OAEP Is RKA SecureJia, D. / Li, B. / Lu, X. / Liu, Y. et al. | 2014
- 282
-
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT SchemeCao, Z. / Lafitte, F. / Markowitch, O. et al. | 2014
- 291
-
LHash: A Lightweight Hash FunctionWu, W. / Wu, S. / Zhang, L. / Zou, J. / Dong, L. et al. | 2014
- 309
-
Cryptanalysis of the Round-Reduced GOST Hash FunctionZou, J. / Wu, W. / Wu, S. et al. | 2014
- 325
-
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesHajra, S. / Mukhopadhyay, D. et al. | 2014
- 343
-
Partially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmLiu, M. / Chen, J. / Li, H. et al. | 2014
- 361
-
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML AssertionsChen, K. / Lin, D. / Yan, L. / Sun, X. et al. | 2014
- 377
-
One-Time Programs with Limited MemoryDurnoga, K. / Dziembowski, S. / Kazana, T. / Zajac, M. et al. | 2014
- 395
-
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor NetworksLi, X. / Wang, P. / Li, B. / Sun, Z. et al. | 2014