Sciweavers

1898 search results - page 97 / 380
» Weak Keys for IDEA
Sort
View
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
14 years 1 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
NDSS
1998
IEEE
14 years 1 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
JSS
2006
66views more  JSS 2006»
13 years 8 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
IJISEC
2007
87views more  IJISEC 2007»
13 years 8 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
SPE
2008
108views more  SPE 2008»
13 years 8 months ago
Effective asymmetric XML compression
The innate verbosity of the Extensible Markup Language remains one of its main weaknesses, especially when large XML documents are concerned. This problem can be solved with the a...
Przemyslaw Skibinski, Szymon Grabowski, Jakub Swac...