Sciweavers

1769 search results - page 260 / 354
» Cryptography
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 3 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 3 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
FSE
2005
Springer
119views Cryptology» more  FSE 2005»
14 years 3 months ago
The Poly1305-AES Message-Authentication Code
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length messa...
Daniel J. Bernstein
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
14 years 3 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
14 years 3 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir