Sciweavers

149 search results - page 9 / 30
» Nonce-Based Symmetric Encryption
Sort
View
EUROCRYPT
2009
Springer
14 years 10 months ago
Order-Preserving Symmetric Encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowin...
Alexandra Boldyreva, Nathan Chenette, Younho Lee, ...
CCS
2009
ACM
14 years 4 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
AINA
2005
IEEE
14 years 3 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
14 years 4 months ago
On Symmetric Encryption and Point Obfuscation
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Dani...
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
14 years 3 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee