Sciweavers

2108 search results - page 140 / 422
» Encrypted
Sort
View
FSE
1994
Springer
145views Cryptology» more  FSE 1994»
15 years 7 months ago
TEA, a Tiny Encryption Algorithm
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
David J. Wheeler, Roger M. Needham
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
15 years 7 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
103
Voted
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
15 years 7 months ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
102
Voted
CCS
2006
ACM
15 years 7 months ago
Inferring the source of encrypted HTTP connections
Marc Liberatore, Brian Neil Levine
83
Voted
CCS
2006
ACM
15 years 7 months ago
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation
Mihir Bellare, Tadayoshi Kohno, Victor Shoup