Sciweavers

8 search results - page 1 / 2
» isw 1997
Sort
View
78
Voted
ISW
1997
Springer
15 years 3 months ago
Practice-Oriented Provable-Security
Mihir Bellare
66
Voted
ISW
1997
Springer
15 years 3 months ago
High-Speed Cryptography
George I. Davida, René Peralta
68
Voted
ISW
1997
Springer
15 years 3 months ago
A High-Speed Small RSA Encryption LSI with Low Power Dissipation
Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki O...
71
Voted
ISW
1997
Springer
15 years 3 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
86
Voted
ISW
1997
Springer
15 years 3 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel