Sciweavers

1562 search results - page 154 / 313
» Mathematics, Cryptology, Security
Sort
View
SACRYPT
1998
Springer
14 years 17 days ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
CRYPTO
1997
Springer
169views Cryptology» more  CRYPTO 1997»
14 years 16 days ago
Deniable Encryption
Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices and also the secret ...
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostr...
FSE
1997
Springer
112views Cryptology» more  FSE 1997»
14 years 15 days ago
A Family of Trapdoor Ciphers
This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain ...
Vincent Rijmen, Bart Preneel
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
14 years 14 days ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 12 days ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith