Sciweavers

217 search results - page 11 / 44
» Selecting Cryptographic Key Sizes
Sort
View
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 8 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
EUROCRYPT
2001
Springer
14 years 14 days ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
CTRSA
2006
Springer
104views Cryptology» more  CTRSA 2006»
13 years 11 months ago
A New Criterion for Nonlinearity of Block Ciphers
For years, the cryptographic community has searched for good nonlinear functions. Bent functions, almost perfect nonlinear functions, and similar constructions have been suggested ...
Orr Dunkelman, Nathan Keller
GECCO
2007
Springer
140views Optimization» more  GECCO 2007»
14 years 2 months ago
Peer-to-peer evolutionary algorithms with adaptive autonomous selection
In this paper we describe and evaluate a fully distributed P2P evolutionary algorithm (EA) with adaptive autonomous selection. Autonomous selection means that decisions regarding ...
W. R. M. U. K. Wickramasinghe, Maarten van Steen, ...
ASIACRYPT
2004
Springer
14 years 1 months ago
Higher Order Universal One-Way Hash Functions
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from ...
Deukjo Hong, Bart Preneel, Sangjin Lee