Sciweavers

981 search results - page 68 / 197
» Advanced Encryption Standard
Sort
View
ASIACRYPT
2006
Springer
14 years 20 days ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
ICMCS
2005
IEEE
142views Multimedia» more  ICMCS 2005»
14 years 2 months ago
An adaptive scalable watermark scheme for high-quality audio archiving and streaming applications
In this paper, we present a scalable (i.e. lossy-to-lossless) watermark scheme based on a recently standardized scalable audio coder – AAZ [4]. The proposed framework enables th...
Zhi Li, Qibin Sun, Yong Lian
ASIACRYPT
2004
Springer
14 years 2 months ago
Practical Two-Party Computation Based on the Conditional Gate
Abstract. We present new results in the framework of secure multiparty computation based on homomorphic threshold cryptosystems. We introduce the conditional gate as a special type...
Berry Schoenmakers, Pim Tuyls
NDSS
1997
IEEE
14 years 1 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
JAR
2000
145views more  JAR 2000»
13 years 8 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro