Sciweavers

872 search results - page 4 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
SACRYPT
2007
Springer
14 years 1 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
13 years 11 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar
ITICSE
2004
ACM
14 years 27 days ago
Teaching operating systems administration with user mode linux
User Mode Linux is a virtual machine running on a GNULinux operating system. It is the right choice for teaching operating systems’ administration, as it does not need any dedic...
Renzo Davoli
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
13 years 11 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
NBIS
2009
Springer
14 years 2 months ago
Enhancing Simulation Mode Operation of ospfd
In this paper, we describe our modifications to ospfd, a popular open-source implementation of OSPF routing protocol. The ospfd software can also be run in simulation mode, where...
Weigao Xie, Balaji Polepalli, Mukul Goyal, Hossein...