<--- Back to Details
First PageDocument Content
Cryptography / Key management / Wireless networking / Building automation / Home automation / Block cipher / Symmetric-key algorithm / Skipjack / Encryption / Blowfish / Message authentication code / Data Encryption Standard
Date: 2014-04-11 22:39:21
Cryptography
Key management
Wireless networking
Building automation
Home automation
Block cipher
Symmetric-key algorithm
Skipjack
Encryption
Blowfish
Message authentication code
Data Encryption Standard

On the Security of Intra-Car Wireless Sensor Networks

Add to Reading List

Source URL: www.csie.ntu.edu.tw

Download Document from Source Website

File Size: 370,20 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Cryptographic software / Disk encryption / Secure communication / Transport Layer Security / Galois/Counter Mode / CCM mode / Cipher suite

Microsoft Word - Encryption_Documentation_for_Beekeeper_Product_and_Services.docx

DocID: 1xVZT - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cryptographic software / Public key infrastructure / ID-based encryption / Encryption / Key / Identity-based conditional proxy re-encryption / Deniable encryption

April 17, 2018 An Introduction to Attribute-Based Encryption Attribute Based Encryption Encryption is a method of encoding data that protects the confidentiality of its contents from unauthorized attackers. Traditionall

DocID: 1xVLe - View Document

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

DocID: 1xVie - View Document

Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

DocID: 1xV7Y - View Document