Sciweavers

501 search results - page 6 / 101
» Redundancy and Diversity in Security
Sort
View
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 9 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
14 years 19 days ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
ASIACRYPT
2007
Springer
14 years 3 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
ASIACRYPT
2003
Springer
14 years 2 months ago
Chosen-Ciphertext Security without Redundancy
Duong Hieu Phan, David Pointcheval
NAR
2011
164views Computer Vision» more  NAR 2011»
12 years 12 months ago
PCDB: a database of protein conformational diversity
PCDB (http://www.pcdb.unq.edu.ar) is a database of protein conformational diversity. For each protein, the database contains the redundant compilation of all the corresponding cry...
Ezequiel I. Juritz, Sebastian Fernandez Alberti, G...