Sciweavers

83 search results - page 3 / 17
» Robust Encryption
Sort
View
TCC
2010
Springer
140views Cryptology» more  TCC 2010»
14 years 22 days ago
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
ESORICS
2004
Springer
13 years 11 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
ASIACRYPT
2000
Springer
13 years 10 months ago
Addition of ElGamal Plaintexts
Abstract. We introduce an efficient method for performing computation on encrypted data, allowing addition of ElGamal encrypted plaintexts. We demonstrate a solution that is robust...
Markus Jakobsson, Ari Juels
CSREASAM
2006
13 years 7 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
CCR
1999
138views more  CCR 1999»
13 years 5 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...