Sciweavers

1843 search results - page 122 / 369
» Securing Class Initialization
Sort
View
CSFW
2005
IEEE
15 years 10 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
155
Voted
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
INDOCRYPT
2005
Springer
15 years 10 months ago
Towards Optimal Double-Length Hash Functions
In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
Mridul Nandi
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
15 years 10 months ago
Practical Symmetric On-Line Encryption
Abstract. This paper addresses the security of symmetric cryptosystems in the blockwise adversarial model. At Crypto 2002, Joux, Martinet and Valette have proposed a new kind of at...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CCS
2001
ACM
15 years 9 months ago
Discouraging Software Piracy Using Software Aging
Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We defin...
Markus Jakobsson, Michael K. Reiter