Sciweavers

17 search results - page 1 / 4
» Does Encryption with Redundancy Provide Authenticity
Sort
View
EUROCRYPT
2001
Springer
13 years 10 months ago
Does Encryption with Redundancy Provide Authenticity?
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’01, Lecture
Jee Hea An, Mihir Bellare
ARC
2007
Springer
119views Hardware» more  ARC 2007»
13 years 11 months ago
Authentication of FPGA Bitstreams: Why and How
Abstract. Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authenticati...
Saar Drimer
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 13 days ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
JCS
2010
112views more  JCS 2010»
13 years 3 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CCS
2010
ACM
13 years 5 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann