Sciweavers

1538 search results - page 167 / 308
» Relative Randomness and Cardinality
Sort
View
CCS
2006
ACM
15 years 1 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
EPEW
2006
Springer
15 years 1 months ago
Experimental Analysis of the Correlation of HTTP GET Invocations
In this paper we experimentally investigate if optimal retry times can be determined based on models that assume independence of successive tries. We do this using data obtained fo...
Philipp Reinecke, Aad P. A. van Moorsel, Katinka W...
EUC
2006
Springer
15 years 1 months ago
Distributed Proximity-Aware Peer Clustering in BitTorrent-Like Peer-to-Peer Networks
In this paper, we propose a hierarchical architecture for grouping peers into clusters in a large-scale BitTorrent-like underlying overlay network in such a way that clusters are e...
Bin Xiao, Jiadi Yu, Zili Shao, Minglu Li
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 1 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 1 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...