Sciweavers

93 search results - page 3 / 19
» On Some Cryptographic Properties of Rijndael
Sort
View
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 3 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
15 years 3 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
72
Voted
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
15 years 1 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri
MAS
1998
Springer
119views Communications» more  MAS 1998»
15 years 1 months ago
Environmental Key Generation Towards Clueless Agents
In this paper, we introduce a collection of cryptographic key constructions built from environmental data that are resistant to adversarial analysis and deceit. We expound upon the...
James Riordan, Bruce Schneier
CCS
2009
ACM
15 years 4 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...