Information Security and Cryptology

Information Security and Cryptology

4.11 - 1251 ratings - Source

Coverage in this proceedings includes digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, system security and trusted computing, and network security.used by such automotive OEMs as Chrysler, Daewoo, Fiat, GM, Honda, Toyota, Volvo, VW, Jaguar [2] and in the HomeLink wireless control systems to ... and provide authentication of an encoder to the decoder (the main system) by sending an encrypted counter value (unilateral communication) [5]. ... MK can remain the same for all immobilizers installed in a certain car model within one production year.

Title:Information Security and Cryptology
Author:Dingyi Pei, Moti Young, Dongdai Lin, Chuankun Wu
Publisher:Springer - 2008-08-17


You Must CONTINUE and create a free account to access unlimited downloads & streaming