Sciweavers

2237 search results - page 66 / 448
» On the Security of Random Sources
Sort
View
CORR
2006
Springer
142views Education» more  CORR 2006»
15 years 4 months ago
Decentralized Erasure Codes for Distributed Networked Storage
We consider the problem of constructing an erasure code for storage over a network when the data sources are distributed. Specifically, we assume that there are n storage nodes wit...
Alexandros G. Dimakis, Vinod M. Prabhakaran, Kanna...
189
Voted
IJCCBS
2010
146views more  IJCCBS 2010»
15 years 3 months ago
A meta-level true random number generator
: True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. In this work, we introduce, extend and analyse the concept of the randomis...
Bernhard Fechner, Andre Osterloh
EUROCRYPT
1998
Springer
15 years 9 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 11 months ago
On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT)
This paper addresses the security issues of the multimedia encryption schemes based on multiple Huffman table (MHT). A detailed analysis of known-plaintext attack is presented to ...
Jiantao Zhou, Zhiqin Liang, Yan Chen, Oscar C. Au
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 9 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes