Sciweavers

26 search results - page 1 / 6
» crypto 2011
Sort
View
CRYPTO
2011
Springer
176views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
CRYPTO
2011
Springer
274views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Alexandra Boldyreva, Nathan Chenette, Adam O'Neill
CRYPTO
2011
Springer
278views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Leftover Hash Lemma, Revisited
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier...
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
The Collision Security of Tandem-DM in the Ideal Cipher Model
We prove that Tandem-DM, one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resist...
Jooyoung Lee, Martijn Stam, John P. Steinberger
TODAES
2011
107views more  TODAES 2011»
12 years 12 months ago
Scan-based attacks on linear feedback shift register based stream ciphers
—In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the linear feedback shift registers in their implementations. Alt...
Yu Liu, Kaijie Wu, Ramesh Karri