Sciweavers

524 search results - page 48 / 105
» On the Security of the DeKaRT Primitive
Sort
View
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 3 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
CN
2006
87views more  CN 2006»
15 years 1 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
185
Voted
LATINCRYPT
2010
15 years 9 days ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
141
Voted
IACR
2011
122views more  IACR 2011»
14 years 1 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
ESORICS
2007
Springer
15 years 8 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...