Sciweavers

JOC
1998
162views more  JOC 1998»
13 years 4 months ago
A Software-Optimized Encryption Algorithm
We describe a software-e cient encryption algorithm named SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudo...
Phillip Rogaway, Don Coppersmith
JOC
1998
76views more  JOC 1998»
13 years 4 months ago
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation
Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesa...
JOC
1998
117views more  JOC 1998»
13 years 4 months ago
An Analysis of SAFER
We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z-module. In particular we consider the invariant Z-submodules ...
Sean Murphy
JOC
1998
135views more  JOC 1998»
13 years 4 months ago
Attacks on Fast Double Block Length Hash Functions
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where k ≤ m, is considered. New attacks are presented on a large ...
Lars R. Knudsen, Xuejia Lai, Bart Preneel