Sciweavers

2303 search results - page 32 / 461
» The Cryptographic Abstract Machine
Sort
View
CMSB
2010
Springer
14 years 9 months ago
A generic abstract machine for stochastic process calculi
Loïc Paulevé, Simon Youssef, Matthew R...
114
Voted
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
15 years 11 months ago
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Abstract. We propose a semantically-secure public-key encryption scheme whose security is polynomialtime equivalent to the hardness of solving random instances of the subset sum pr...
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
IFIP
2009
Springer
15 years 9 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
114
Voted
IFIP
2004
Springer
15 years 7 months ago
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions
Abstract A Boolean function is called normal if it is constant on flats of certain dimensions. This property is relevant for the construction and analysis of cryptosystems. This p...
An Braeken, Christopher Wolf, Bart Preneel
CRYPTO
1994
Springer
104views Cryptology» more  CRYPTO 1994»
15 years 6 months ago
Cryptographic Randomness from Air Turbulence in Disk Drives
Abstract. A computer disk drive's motor speed varies slightly but irregularly, principally because of air turbulence inside the disk's enclosure. The unpredictability of ...
Don Davis, Ross Ihaka, Philip Fenstermacher