Sciweavers

1769 search results - page 146 / 354
» Cryptography
Sort
View
117
Voted
FC
1998
Springer
121views Cryptology» more  FC 1998»
15 years 7 months ago
Cryptanalysis of SPEED
Abstract. The cipher family SPEED (and an associated hashing mode) was recently proposed in Financial Cryptography '97. This paper cryptanalyzes that proposal, in two parts: F...
Chris Hall, John Kelsey, Bruce Schneier, David Wag...
FSE
1998
Springer
94views Cryptology» more  FSE 1998»
15 years 7 months ago
CS-Cipher
In this paper we describe our new CS2 block cipher which is an extension of the original CS-Cipher. Our new design inherits the efficiency of the original design while being upgrad...
Jacques Stern, Serge Vaudenay
ICICS
1997
Springer
15 years 7 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
COCO
1993
Springer
133views Algorithms» more  COCO 1993»
15 years 7 months ago
On Span Programs
We introduce a linear algebraic model of computation, the Span Program, and prove several upper and lower bounds on it. These results yield the following applications in complexit...
Mauricio Karchmer, Avi Wigderson
ISSAC
1992
Springer
114views Mathematics» more  ISSAC 1992»
15 years 7 months ago
Parallel Lattice Basis Reduction
Abstract. Lattice basis reduction is an important problem in geometry of numbers with applications in combinatorial optimization, computer algebra, and cryptography. The well-known...
Gilles Villard