Sciweavers

17 search results - page 1 / 4
» Oracle Channels
Sort
View
TDHMS
2008
13 years 5 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
IJNSEC
2010
128views more  IJNSEC 2010»
13 years 2 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
13 years 11 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 25 days ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee