Sciweavers

2108 search results - page 100 / 422
» Encrypted
Sort
View
PPPJ
2003
ACM
15 years 8 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling
FSE
2000
Springer
85views Cryptology» more  FSE 2000»
15 years 6 months ago
Mercy: A Fast Large Block Cipher for Disk Sector Encryption
Abstract. We discuss the special requirements imposed on the underlying cipher of systems which encrypt each sector of a disk partition independently, and demonstrate a certificati...
Paul Crowley
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
15 years 6 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
PST
2008
15 years 4 months ago
Investigating Two Different Approaches for Encrypted Traffic Classification
The basic objective of this work is to compare the utility of an expert driven system and a data driven system for classifying encrypted network traffic, specifically SSH traffic ...
Riyad Alshammari, A. Nur Zincir-Heywood
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Ba
The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR...
Zvika Brakerski, Shafi Goldwasser