Sciweavers

1898 search results - page 9 / 380
» Weak Keys for IDEA
Sort
View
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 9 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
JUCS
2008
117views more  JUCS 2008»
13 years 8 months ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy
BIRTHDAY
2005
Springer
14 years 2 months ago
Reduction Strategies for Left-Linear Term Rewriting Systems
Huet and L´evy (1979) showed that needed reduction is a normalizing strategy for orthogonal (i.e., left-linear and non-overlapping) term rewriting systems. In order to obtain a de...
Yoshihito Toyama
CATS
2008
13 years 10 months ago
Weak Parametric Failure Equivalences and Their Congruence Formats
Weak equivalences are important behavioral equivalences in the course of specifying and analyzing the reactive systems using process algebraic languages. In this paper, we propose...
Xiaowei Huang, Li Jiao, Weiming Lu
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux