Sciweavers

1190 search results - page 94 / 238
» Secure off-the-record messaging
Sort
View
IACR
2011
105views more  IACR 2011»
14 years 4 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
15 years 10 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 9 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
ULPAA
1994
120views Hardware» more  ULPAA 1994»
15 years 6 months ago
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
A uniform extension language for email systems can radically extend the utility of electronic mail, simplifying the construction of mail-based services and permitting the delivery...
Nathaniel S. Borenstein