Sciweavers

872 search results - page 15 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
ACSC
2006
IEEE
13 years 11 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb
EUROCRYPT
2001
Springer
13 years 12 months ago
Encryption Modes with Almost Free Message Integrity
We define a new mode of operation for block encryption which in addition to assuring confidentiality also assures message integrity. In contrast, previously for message integrity...
Charanjit S. Jutla
USS
2010
13 years 5 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...
GLOBECOM
2009
IEEE
14 years 2 months ago
System-Level Performance Evaluation of Multi-Cell Transparent Mode Relay 802.16j Systems
— In this paper, the system capacity of a multi-cell IEEE 802.16j system operating in transparent mode is investigated. A previous published analytical model is used and incorpor...
Vasken Genc, Seán Murphy, John Murphy, Abde...
CRYPTO
2007
Springer
88views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Invertible Universal Hashing and the TET Encryption Mode
This work describes a mode of operation, TET, that turns a regular block cipher into a length-preserving enciphering scheme for messages of (almost) arbitrary length. When using a...
Shai Halevi