Sciweavers

2108 search results - page 87 / 422
» Encrypted
Sort
View
INDOCRYPT
2004
Springer
15 years 8 months ago
A Provably Secure Elliptic Curve Scheme with Fast Encryption
Abstract. We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. The scheme uses arithmetic modulo n2...
David Galindo, Sebastià Martín Molle...
SDMW
2004
Springer
15 years 8 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
ASM
2003
ASM
15 years 8 months ago
Privacy, Abstract Encryption and Protocols: An ASM Model - Part I
d in Abstract State Machines – Advances in Theory and Applications: 10th International Workshop, ASM 2003, volume 2589 of LNCS, Springer–Verlag. Abstract Encryption and Protoco...
Dean Rosenzweig, Davor Runje, Neva Slani
FSE
2010
Springer
180views Cryptology» more  FSE 2010»
15 years 8 months ago
Fast Software AES Encryption
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR mi...
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David ...
ASIACRYPT
2001
Springer
15 years 7 months ago
Provable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the...
Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi