Sciweavers

524 search results - page 8 / 105
» On the Security of the DeKaRT Primitive
Sort
View
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 2 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
ACISP
2009
Springer
14 years 2 months ago
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
Abstract. We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been...
Ahto Buldas, Aivo Jürgenson, Margus Niitsoo
SP
2007
IEEE
101views Security Privacy» more  SP 2007»
14 years 4 months ago
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
Ted Huffmire, Brett Brotherton, Gang Wang, Timothy...
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 10 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet