Sciweavers

4 search results - page 1 / 1
» Ciphers that securely encipher their own keys
Sort
View
CCS
2011
ACM
12 years 4 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
USENIX
1994
13 years 6 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 4 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar