Sciweavers

1562 search results - page 99 / 313
» Mathematics, Cryptology, Security
Sort
View
FSE
1997
Springer
81views Cryptology» more  FSE 1997»
14 years 11 days ago
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications
Abstract. This paper presents xmx, a new symmetric block cipher optimized for public-key libraries and microcontrollers with arithmetic coprocessors. xmx has no S-boxes and uses on...
David M'Raïhi, David Naccache, Jacques Stern,...
CRYPTO
1992
Springer
154views Cryptology» more  CRYPTO 1992»
14 years 9 days ago
Massively Parallel Computation of Discrete Logarithms
Numerous cryptosystems have been designed to be secure under the assumption that the computation of discrete logarithms is infeasible. This paper reports on an aggressive attempt ...
Daniel M. Gordon, Kevin S. McCurley
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
14 years 8 days ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin
CISC
2007
Springer
117views Cryptology» more  CISC 2007»
14 years 4 days ago
An Efficient ID-Based Proxy Signature Scheme from Pairings
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is onl...
Chunxiang Gu, Yuefei Zhu
FC
2010
Springer
183views Cryptology» more  FC 2010»
14 years 3 days ago
Automatically Preparing Safe SQL Queries
We present the first sound program source transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsa...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...