Sciweavers

713 search results - page 110 / 143
» Dispersing Hash Functions
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
IAW
2003
IEEE
15 years 3 months ago
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency
— The Computational Resiliency library (CRLib) provides distributed systems with the ability to sustain operation and dynamically restore the level of assurance in system functio...
Norka B. Lucena, Steve J. Chapin, Joohan Lee
IPTPS
2003
Springer
15 years 2 months ago
Semantic-Free Referencing in Linked Distributed Systems
Every distributed system that employs linking requires a Reference Resolution Service (RRS) to convert link references to locations. We argue that the Web’s use of DNS for this ...
Hari Balakrishnan, Scott Shenker, Michael Walfish
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
15 years 2 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin
AAECC
2009
Springer
138views Algorithms» more  AAECC 2009»
15 years 1 months ago
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Abstract. We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) ...
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki ...