Sciweavers

391 search results - page 2 / 79
» Secure Multiparty AES
Sort
View
CCS
2001
ACM
13 years 9 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 8 days ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
ASIACRYPT
2007
Springer
13 years 11 months ago
Multi-party Indirect Indexing and Applications
Abstract. We develop a new multi-party generalization of Naor-Nissim indirect indexing, making it possible for many participants to simulate a RAM machine with only poly-logarithmi...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
GRC
2008
IEEE
13 years 6 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
FSE
2007
Springer
250views Cryptology» more  FSE 2007»
13 years 11 months ago
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
Jongsung Kim, Seokhie Hong, Bart Preneel