Sciweavers

1898 search results - page 31 / 380
» Weak Keys for IDEA
Sort
View
INTERACT
2003
13 years 10 months ago
Key Functionalities of SAP Community
: The SAP Community is a platform for a true virtual community where people and companies come together to exchange ideas, solve problems, benefit from stimulating advice, and coll...
Raimund Mollenhauer
ACSAC
2006
IEEE
14 years 2 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 8 months ago
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
The cryptosystem proposed by Koyama is not semantically secure. Also, it is not secure against partial known plaintext attack, linearly related plaintext attack and low exponent a...
Sahadeo Padhye, Birendra Kumar Sharma
ICALP
1997
Springer
14 years 24 days ago
Recursive Computational Depth
In the 1980's, Bennett introduced computational depth as a formal measure of the amount of computational history that is evident in an object's structure. In particular,...
James I. Lathrop, Jack H. Lutz
SASN
2004
ACM
14 years 2 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...