Sciweavers

550 search results - page 72 / 110
» Public Key Encryption and Encryption Emulation Attacks
Sort
View
126
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
131
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
99
Voted
FDTC
2007
Springer
105views Cryptology» more  FDTC 2007»
15 years 8 months ago
Tate Pairing with Strong Fault Resiliency
We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pai...
Erdinç Öztürk, Gunnar Gaubatz, Be...
108
Voted
CRYPTO
1992
Springer
156views Cryptology» more  CRYPTO 1992»
15 years 6 months ago
DES is not a Group
We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encry...
Keith W. Campbell, Michael J. Wiener
138
Voted
IACR
2011
205views more  IACR 2011»
14 years 2 months ago
Biclique Cryptanalysis of the Block Cipher SQUARE
Abstract. SQUARE, an 8-round substitution-permutation block cipher, is considered as the predecessor of the AES. In this paper, inspired from the recent biclique attack on the AES ...
Hamid Mala