Sciweavers

1019 search results - page 68 / 204
» Cryptographic Design Vulnerabilities
Sort
View
IJNSEC
2007
82views more  IJNSEC 2007»
15 years 3 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 3 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
233
Voted
ICDE
2003
IEEE
130views Database» more  ICDE 2003»
16 years 5 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
15 years 8 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
140
Voted
CSFW
2010
IEEE
15 years 7 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin