Sciweavers

152 search results - page 8 / 31
» Order-Preserving Symmetric Encryption
Sort
View
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 10 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
FOCS
1997
IEEE
15 years 8 months ago
A Concrete Security Treatment of Symmetric Encryption
Mihir Bellare, Anand Desai, E. Jokipii, Phillip Ro...
DCC
2007
IEEE
16 years 4 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
PKC
2005
Springer
67views Cryptology» more  PKC 2005»
15 years 10 months ago
Symmetric Subgroup Membership Problems
Abstract. We define and discuss symmetric subgroup membership problems and their properties, including a relation to the Decision DiffieHellman problem. We modify the Cramer-Shoup...
Kristian Gjøsteen
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 11 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...