Sciweavers

341 search results - page 35 / 69
» Deniable Functional Encryption
Sort
View
IAJIT
2008
179views more  IAJIT 2008»
14 years 11 months ago
Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers
: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption sc...
Ragheb Toemeh, Subbanagounder Arumugam
ISPEC
2009
Springer
15 years 5 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
ESORICS
2007
Springer
15 years 5 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
81
Voted
CSL
2004
Springer
15 years 4 months ago
Complete Lax Logical Relations for Cryptographic Lambda-Calculi
Abstract. Security properties are profitably expressed using notions of contextual equivalence, and logical relations are a powerful proof technique to establish contextual equiva...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
ACISP
2000
Springer
15 years 3 months ago
High Performance Agile Crypto Modules
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng