Sciweavers

58 search results - page 2 / 12
» crypto 2008
Sort
View
CRYPTO
2008
Springer
83views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas...
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
ISSA
2004
13 years 6 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
CRYPTO
2008
Springer
107views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Circular-Secure Encryption from Decision Diffie-Hellman
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a "key cy...
Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Os...
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Preimages for Reduced SHA-0 and SHA-1
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of ...
Christophe De Cannière, Christian Rechberge...