Sciweavers

CRYPTO
1994
Springer
144views Cryptology» more  CRYPTO 1994»
14 years 1 months ago
Differential-Linear Cryptanalysis
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linea...
Susan K. Langford, Martin E. Hellman
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
14 years 1 months ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
14 years 1 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
14 years 1 months ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
Cryptology
Top of PageReset Settings