Sciweavers

1898 search results - page 32 / 380
» Weak Keys for IDEA
Sort
View
EUROCRYPT
2004
Springer
14 years 2 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 7 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
APAL
2007
63views more  APAL 2007»
13 years 8 months ago
Bounded functional interpretation and feasible analysis
In this article we study applications of the bounded functional interpretation to theories of feasible arithmetic and analysis. The main results show that the novel interpretation...
Fernando Ferreira, Paulo Oliva
SIAMSC
2011
133views more  SIAMSC 2011»
13 years 3 months ago
On the Existence and the Applications of Modified Equations for Stochastic Differential Equations
In this paper we describe a general framework for deriving modified equations for stochastic differential equations with respect to weak convergence. Modified equations are deri...
K. C. Zygalakis
IMC
2009
ACM
14 years 3 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...