Sciweavers

981 search results - page 35 / 197
» Advanced Encryption Standard
Sort
View
TIT
2011
125views more  TIT 2011»
13 years 5 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
DAC
2005
ACM
14 years 12 months ago
High performance encryption cores for 3G networks
This paper presents two novel and high performance hardware architectures, implemented in FPGA technology, for the KASUMI block cipher; this algorithm lies at the core of the conf...
René Cumplido, Tomás Balderas-Contre...
GI
2001
Springer
14 years 3 months ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich
AES
2000
Springer
136views Cryptology» more  AES 2000»
14 years 3 months ago
Preliminary Cryptanalysis of Reduced-Round Serpent
Serpent is a 32-round AES block cipher finalist. In this paper we present several attacks on reduced-round variants of Serpent that require less work than exhaustive search. We at...
Tadayoshi Kohno, John Kelsey, Bruce Schneier
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
14 years 4 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...