Sciweavers

2108 search results - page 282 / 422
» Encrypted
Sort
View
PKC
2010
Springer
217views Cryptology» more  PKC 2010»
15 years 6 months ago
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Lossy Trapdoor Functions (LTDFs), introduced by Peikert and Waters (STOC 2008) have been useful for building many cryptographic primitives. In particular, by using an LTDF that los...
Petros Mol, Scott Yilek
151
Voted
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
15 years 6 months ago
XML Query Optimisation: Specify your Selectivity
The problem of efficiently evaluating XPath and XQuery queries has become increasingly significant since more and more XML data is stored in its native form. We propose a novel op...
Sven Hartmann, Sebastian Link
101
Voted
SAT
2010
Springer
141views Hardware» more  SAT 2010»
15 years 6 months ago
Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT
Non-trivial linear straight-line programs over the Galois field of two elements occur frequently in applications such as encryption or high-performance computing. Finding the shor...
Carsten Fuhs, Peter Schneider-Kamp
111
Voted
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 6 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
122
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini