Sciweavers

472 search results - page 49 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
13 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
14 years 2 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir
USENIX
2001
13 years 11 months ago
Fast Indexing: Support for Size-Changing Algorithms in Stackable File Systems
Stackable file systems can provide extensible file system functionality with minimal performance overhead and development cost. However, previous approaches provide only limited f...
Erez Zadok, Johan M. Andersen, Ion Badulescu, Jaso...
JDCTA
2010
113views more  JDCTA 2010»
13 years 4 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
CRYPTO
2011
Springer
179views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Smaller Decoding Exponents: Ball-Collision Decoding
Very few public-key cryptosystems are known that can encrypt and decrypt in time b2+o(1) with conjectured security level 2b against conventional computers and quantum computers. Th...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...