Sciweavers

5324 search results - page 103 / 1065
» Internet Security Protocols
Sort
View
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
15 years 1 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
EUROPAR
2008
Springer
14 years 11 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...