Sciweavers

11 search results - page 1 / 3
» sacrypt 1998
Sort
View
SACRYPT
1998
Springer
13 years 10 months ago
Over the Air Service Provisioning
Sarvar Patel
SACRYPT
1998
Springer
112views Cryptology» more  SACRYPT 1998»
13 years 10 months ago
Cryptanalysis of ORYX
Abstract. We present an attack on the ORYX stream cipher that requires only 25
David Wagner, Leone Simpson, Ed Dawson, John Kelse...
SACRYPT
1998
Springer
13 years 10 months ago
Mix-Based Electronic Payments
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on ...
Markus Jakobsson, David M'Raïhi
SACRYPT
1998
Springer
129views Cryptology» more  SACRYPT 1998»
13 years 10 months ago
An Accurate Evaluation of Maurer's Universal Test
Maurer's universal test is a very common randomness test, capable of detecting a wide gamut of statistical defects. The algorithm is simple (a few Java code lines), flexible (...
Jean-Sébastien Coron, David Naccache
SACRYPT
1998
Springer
101views Cryptology» more  SACRYPT 1998»
13 years 10 months ago
On the Twofish Key Schedule
Twofish is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we briefly review the st...
Bruce Schneier, John Kelsey, Doug Whiting, David W...