Sciweavers

2108 search results - page 207 / 422
» Encrypted
Sort
View
113
Voted
CRYPTO
1993
Springer
95views Cryptology» more  CRYPTO 1993»
15 years 8 months ago
Weak Keys for IDEA
Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [2]. IDEA has a 128bit key and encrypts blocks of 64 bits. For a class of 2...
Joan Daemen, René Govaerts, Joos Vandewalle
175
Voted
CRYPTO
1994
Springer
144views Cryptology» more  CRYPTO 1994»
15 years 8 months ago
Differential-Linear Cryptanalysis
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linea...
Susan K. Langford, Martin E. Hellman
123
Voted
AC
1998
Springer
15 years 8 months ago
Contemporary Block Ciphers
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outli...
Lars R. Knudsen
124
Voted
CCS
2006
ACM
15 years 7 months ago
Privacy-preserving semantic interoperation and access control of heterogeneous databases
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalak...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner