Sciweavers

1564 search results - page 201 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
FSE
1997
Springer
81views Cryptology» more  FSE 1997»
15 years 2 months ago
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications
Abstract. This paper presents xmx, a new symmetric block cipher optimized for public-key libraries and microcontrollers with arithmetic coprocessors. xmx has no S-boxes and uses on...
David M'Raïhi, David Naccache, Jacques Stern,...
ASIACRYPT
1991
Springer
15 years 1 months ago
Limitations of the Even-Mansour Construction
In [1] a construction of a block cipher from a single pseudorandom permutation is proposed. In a complexity theoretical setting they prove that this scheme is secure against a pol...
Joan Daemen
CSREASAM
2008
14 years 11 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
DFN
2003
14 years 11 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen
CIDR
2009
113views Algorithms» more  CIDR 2009»
14 years 11 months ago
Remembrance: The Unbearable Sentience of Being Digital
We introduce a world vision in which data is endowed with memory. In this data-centric systems paradigm, data items can be enabled to retain all or some of their previous values. ...
Ragib Hasan, Radu Sion, Marianne Winslett