Sciweavers

731 search results - page 53 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
14 years 2 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
SSWMC
2004
14 years 4 days ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
IJSN
2008
114views more  IJSN 2008»
13 years 10 months ago
Adaptive clustering for scalable key management in dynamic group communications
: Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-b...
Yacine Challal, Said Gharout, Abdelmadjid Bouabdal...
IJCSA
2006
121views more  IJCSA 2006»
13 years 10 months ago
Evaluation of the RC4 Algorithm for Data Encryption
Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm...
Allam Mousa, Ahmad Hamad
CCS
2003
ACM
14 years 4 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai