Sciweavers

2108 search results - page 167 / 422
» Encrypted
Sort
View
144
Voted
SACRYPT
2000
Springer
145views Cryptology» more  SACRYPT 2000»
15 years 7 months ago
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced...
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, M...
136
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
140
Voted
ACISP
2010
Springer
15 years 5 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
136
Voted
DBSEC
2007
116views Database» more  DBSEC 2007»
15 years 5 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
102
Voted
SEC
2007
15 years 5 months ago
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsou...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...