Sciweavers

16 search results - page 2 / 4
» An Extended DES
Sort
View
EUROCRYPT
1990
Springer
13 years 9 months ago
A Known Plaintext Attack on Two-Key Triple Encryption
A chosen-plaintext attack on two-key triple encryption noted by Merkle and Hellman is extended to a known-plaintext attack. The known-plaintext attack has lower memory requirements...
Paul C. van Oorschot, Michael J. Wiener
NAR
2011
232views Computer Vision» more  NAR 2011»
13 years 21 days ago
REDfly v3.0: toward a comprehensive database of transcriptional regulatory elements in Drosophila
The REDfly database of Drosophila transcriptional cis-regulatory elements provides the broadest and most comprehensive available resource for experimentally validated cis-regulato...
Steven M. Gallo, Dave T. Gerrard, David Miner, Mic...
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
13 years 10 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
RIA
2008
73views more  RIA 2008»
13 years 5 months ago
Representing and Manipulating Situation Hierarchies using Situation Lattices
Situations, the semantic interpretations of context, provide a better basis for selecting adaptive behaviours than context itself. The definition of situations typically rests on t...
Juan Ye, Lorcan Coyle, Simon A. Dobson, Paddy Nixo...
ASIACRYPT
2009
Springer
14 years 10 days ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer