Sciweavers

472 search results - page 12 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
CRYPTOLOGIA
2007
366views more  CRYPTOLOGIA 2007»
13 years 9 months ago
A Simplified Idea Algorithm
Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions of DES [8] [1...
Nick Hoffman
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
14 years 3 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
ICIP
2002
IEEE
14 years 11 months ago
On the security of an image encryption method
The security of digital images attracts much attention recently, and many different image encryption methods have been proposed. In 1999, J.-C. Yen and J.-I. Guo proposed a novel ...
Shujun Li, Xuan Zheng
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 10 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio