Sciweavers

2 search results - page 1 / 1
» Attacks on Additive Encryption of Redundant Plaintext and Im...
Sort
View
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
13 years 8 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
13 years 9 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...