Sciweavers

12 search results - page 2 / 3
» icics 1997
Sort
View
ICICS
1997
Springer
13 years 9 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
ICICS
1997
Springer
13 years 9 months ago
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
Abstract. We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintex...
John Kelsey, Bruce Schneier, David Wagner
ICICS
1997
Springer
13 years 9 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
ICICS
1997
Springer
13 years 8 months ago
Secure document management and distribution in an open network environment
Abstract. This paper analyzes the problem of secure document management and distribution in an open network environment. Reader and author authentication, document integrity, origi...
Antonio Lioy, Fabio Maino, Marco Mezzalama
ICICS
1997
Springer
13 years 9 months ago
A new and optimal chosen-message attack on RSA-type cryptosystems
Abstract. Chosen-message attack on RSA is usually considered as an inherent property of its homomorphic structure. In this paper, we show that nonhomomorphic RSA-type cryptosystems...
Daniel Bleichenbacher, Marc Joye, Jean-Jacques Qui...