Sciweavers

CRYPTO
1994
Springer
144views Cryptology» more  CRYPTO 1994»
13 years 9 months ago
Differential-Linear Cryptanalysis
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linea...
Susan K. Langford, Martin E. Hellman
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
13 years 9 months ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw
CRYPTO
1994
Springer
104views Cryptology» more  CRYPTO 1994»
13 years 9 months ago
Cryptographic Randomness from Air Turbulence in Disk Drives
Abstract. A computer disk drive's motor speed varies slightly but irregularly, principally because of air turbulence inside the disk's enclosure. The unpredictability of ...
Don Davis, Ross Ihaka, Philip Fenstermacher
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
13 years 9 months ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
13 years 9 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
CRYPTO
1994
Springer
100views Cryptology» more  CRYPTO 1994»
13 years 9 months ago
Incremental Cryptography: The Case of Hashing and Signing
Mihir Bellare, Oded Goldreich, Shafi Goldwasser