Sciweavers

2108 search results - page 28 / 422
» Encrypted
Sort
View
EUROCRYPT
2010
Springer
15 years 5 months ago
Computational Soundness, Co-induction, and Encryption Cycles
We analyze the relation between induction, co-induction and the presence of encryption cycles in the context of computationally sound symbolic equivalence of cryptographic express...
Daniele Micciancio
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
15 years 2 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
108
Voted
ICWN
2007
15 years 2 months ago
A New Lightweight and Scalable Encryption Algorithm for Streaming Video over Wireless Networks
Wireless networks are poised to enable a variety of existing and emerging video streaming applications. However, video streaming over wireless suffers from piracy and malicious at...
Hao Wang, Chong-wei Xu
76
Voted
SIGCOMM
2010
ACM
15 years 29 days ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
127
Voted
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
15 years 25 days ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio