Sciweavers

930 search results - page 3 / 186
» A Universal Encryption Standard
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 8 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
IJNSEC
2007
109views more  IJNSEC 2007»
13 years 5 months ago
Related-Mode Attacks on CTR Encryption Mode
In this paper, we discuss using CTR mode, another standard encryption mode, to attack other standard encryption modes and using other standard encryption modes to attack CTR mode ...
Dayin Wang, Dongdai Lin, Wenling Wu
CORR
2002
Springer
95views Education» more  CORR 2002»
13 years 5 months ago
A Polynomial Description of the Rijndael Advanced Encryption Standard
The paper gives a polynomial description of the Rijndael Advanced Encryption Standard recently adopted by the National Institute of Standards and Technology. Special attention is ...
Joachim Rosenthal
AES
2000
Springer
105views Cryptology» more  AES 2000»
13 years 9 months ago
The Effects of Multiple Algorithms in the Advanced Encryption Standard
This paper presents a discussion of the issues relating to the selection of encryption algorithms in practical situations. An AES standard which recommends multiple algorithms in ...
Ian Harvey
EUROCRYPT
2006
Springer
13 years 9 months ago
The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
In this paper we examine the security criteria for a KEM and a DEM that are sufficient for the overall hybrid encryption scheme to be plaintext-aware in the standard model. We appl...
Alexander W. Dent