Sciweavers

1825 search results - page 79 / 365
» Cryptographic Securities Exchanges
Sort
View
162
Voted
PPPJ
2003
ACM
15 years 8 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling
133
Voted
PKC
2000
Springer
107views Cryptology» more  PKC 2000»
15 years 7 months ago
Some Remarks on a Fair Exchange Protocol
Fair exchange turns out to be an increasingly importanttopic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each...
Jianying Zhou, Robert H. Deng, Feng Bao
SIGCOMM
2004
ACM
15 years 9 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
ICITS
2009
15 years 1 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
124
Voted
ACISP
2004
Springer
15 years 7 months ago
Secure Bilinear Diffie-Hellman Bits
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been u...
Steven D. Galbraith, Herbie J. Hopkins, Igor Shpar...