Sciweavers

954 search results - page 67 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
14 years 7 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CSFW
2012
IEEE
13 years 8 days ago
Generic Indifferentiability Proofs of Hash Designs
—In this paper, we propose a formal analysis of domain extenders for hash functions in the indifferentiability framework. We define a general model for domain extenders and prov...
Marion Daubignard, Pierre-Alain Fouque, Yassine La...
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
15 years 3 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
15 years 3 months ago
Practical Symmetric On-Line Encryption
Abstract. This paper addresses the security of symmetric cryptosystems in the blockwise adversarial model. At Crypto 2002, Joux, Martinet and Valette have proposed a new kind of at...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
15 years 3 months ago
Rabbit: A New High-Performance Stream Cipher
Abstract. We present a new stream cipher, Rabbit, based on iterating a set of coupled nonlinear functions. Rabbit is characterized by a high performance in software with a measured...
Martin Boesgaard, Mette Vesterager, Thomas Pederse...