The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
Fall COMDEX was the center of numerous showings of new tape technologies offering significant increases in tape capacity and performance. Of interest to users of midrange tape tec...
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
In this paper we discuss the main challenges faced by electronic government initiatives. First, the components of and the demand for electronic government services are identified. ...