Sciweavers

2108 search results - page 196 / 422
» Encrypted
Sort
View
112
Voted
ASIACRYPT
2001
Springer
15 years 8 months ago
A Compact Rijndael Hardware Architecture with S-Box Optimization
Compact and high-speed hardware architectures and logic optimization methods for the AES algorithm Rijndael are described. Encryption and decryption data paths are combined and all...
Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji M...
IH
2001
Springer
15 years 8 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
MMMACNS
2001
Springer
15 years 8 months ago
On Some Cryptographic Properties of Rijndael
We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES)....
Selçuk Kavut, Melek D. Yücel
MM
2000
ACM
112views Multimedia» more  MM 2000»
15 years 8 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
ACISP
2000
Springer
15 years 8 months ago
High Performance Agile Crypto Modules
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng