Sciweavers

461 search results - page 37 / 93
» The RC5 Encryption Algorithm
Sort
View
CNSR
2009
IEEE
102views Communications» more  CNSR 2009»
13 years 11 months ago
Online Classification of Network Flows
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
13 years 11 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
IJNSEC
2007
82views more  IJNSEC 2007»
13 years 7 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
ICIP
1998
IEEE
14 years 9 months ago
Hiding Information in Images
In this study, a new algorithm is proposed for the cryptography and steganography of an image or text. There is a variety of steganography and cryptography tools which are commonl...
Lisa M. Marvel, Charles T. Retter, Charles G. Bonc...
EUROCRYPT
2010
Springer
14 years 15 days ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...