Sciweavers

2601 search results - page 399 / 521
» Secure Rewarding Schemes
Sort
View
FSE
1997
Springer
81views Cryptology» more  FSE 1997»
15 years 7 months ago
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications
Abstract. This paper presents xmx, a new symmetric block cipher optimized for public-key libraries and microcontrollers with arithmetic coprocessors. xmx has no S-boxes and uses on...
David M'Raïhi, David Naccache, Jacques Stern,...
ICICS
1997
Springer
15 years 7 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
115
Voted
ASIACRYPT
1991
Springer
15 years 6 months ago
Limitations of the Even-Mansour Construction
In [1] a construction of a block cipher from a single pseudorandom permutation is proposed. In a complexity theoretical setting they prove that this scheme is secure against a pol...
Joan Daemen
CSREASAM
2008
15 years 4 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
EV
2008
86views Hardware» more  EV 2008»
15 years 4 months ago
Long-term Retention in E-Voting - Legal Requirements and Technical Implementation
: Legally binding elections require retention of specified election data such as balloting material. This applies to paper-based as well as electronic elections. However, in German...
Rotraud Gitter, Lucie Langer, Susanne Okunick, Zoi...