Sciweavers

461 search results - page 36 / 93
» The RC5 Encryption Algorithm
Sort
View
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
14 years 2 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ANTS
2004
Springer
121views Algorithms» more  ANTS 2004»
14 years 1 months ago
Function Field Sieve in Characteristic Three
In this paper we investigate the efficiency of the function field sieve to compute discrete logarithms in the finite fields F3n . Motivated by attacks on identity based encrypti...
Robert Granger, Andrew J. Holt, Dan Page, Nigel P....
CHES
2006
Springer
119views Cryptology» more  CHES 2006»
13 years 11 months ago
NanoCMOS-Molecular Realization of Rijndael
This paper describes the implementation of the Advanced Encryption Standard Algorithm, Rijndael, in a new nanoscale technology, called CMOL. This technology consists of an array of...
Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
14 years 2 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
CCS
2004
ACM
14 years 1 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons