Sciweavers

2108 search results - page 56 / 422
» Encrypted
Sort
View
142
Voted
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
110
Voted
CSREASAM
2006
15 years 2 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
PST
2004
15 years 2 months ago
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Deholo Nali, Ali Miri, Carlisle M. Adams
106
Voted
IJES
2006
93views more  IJES 2006»
15 years 1 months ago
Dynamically configurable security for SRAM FPGA bitstreams
This paper proposes a solution to improve the security of SRAM FPGAs through bitstream encryption. This proposition is distinct from other works because it uses the latest capabil...
Lilian Bossuet, Guy Gogniat, Wayne Burleson
79
Voted
CRYPTOLOGIA
2007
366views more  CRYPTOLOGIA 2007»
15 years 1 months ago
A Simplified Idea Algorithm
Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions of DES [8] [1...
Nick Hoffman