Sciweavers

252 search results - page 7 / 51
» How Secure is Deterministic Encryption
Sort
View
ESORICS
2012
Springer
11 years 10 months ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter
IACR
2011
122views more  IACR 2011»
12 years 7 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
MM
2000
ACM
112views Multimedia» more  MM 2000»
13 years 12 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
FSE
1997
Springer
131views Cryptology» more  FSE 1997»
13 years 11 months ago
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms desi...
Bruce Schneier, Doug Whiting
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon