Sciweavers

38 search results - page 3 / 8
» crypto 2003
Sort
View
CRYPTO
2003
Springer
105views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
On Memory-Bound Functions for Fighting Spam
In 1992, Dwork and Naor proposed that e-mail messages be accompanied by easy-to-check proofs of computational effort in order to discourage junk e-mail, now known as spam. They pro...
Cynthia Dwork, Andrew Goldberg, Moni Naor
CRYPTO
2003
Springer
111views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the ...
Elad Barkan, Eli Biham, Nathan Keller
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...