Sciweavers

1769 search results - page 196 / 354
» Cryptography
Sort
View
138
Voted
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 9 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
166
Voted
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
15 years 9 months ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry
FSTTCS
2003
Springer
15 years 9 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 8 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann
DEXAW
2002
IEEE
231views Database» more  DEXAW 2002»
15 years 8 months ago
A Cultural Heritage Forum Celebrating Technological Innovation at Station X
We aim to encourage and support public participation in heritage through the development of Cultural Heritage Forums, a kind of cultural web portal that enables active participati...
Trevor D. Collins, Paul Mulholland