Sciweavers

981 search results - page 67 / 197
» Advanced Encryption Standard
Sort
View
127
Voted
CCS
2005
ACM
15 years 8 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
INTEGRATION
2007
100views more  INTEGRATION 2007»
15 years 2 months ago
A fast pipelined multi-mode DES architecture operating in IP representation
The Data Encryption Standard (DES) is a cipher that is still used in a broad range of applications, from smartcards, where it is often implemented as a tamperresistant embedded co...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...
ACSAC
2003
IEEE
15 years 7 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
115
Voted
CNSM
2010
15 years 17 days ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood
148
Voted
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
13 years 10 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...