Sciweavers

13 search results - page 3 / 3
» crypto 1993
Sort
View
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
14 years 18 hour ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor