Abstract. We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. The scheme uses arithmetic modulo n2...
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
d in Abstract State Machines – Advances in Theory and Applications: 10th International Workshop, ASM 2003, volume 2589 of LNCS, Springer–Verlag. Abstract Encryption and Protoco...
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR mi...
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David ...
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the...