Sciweavers

11 search results - page 2 / 3
» crypto 1992
Sort
View
CRYPTO
1992
Springer
156views Cryptology» more  CRYPTO 1992»
14 years 2 months ago
DES is not a Group
We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encry...
Keith W. Campbell, Michael J. Wiener
CRYPTO
1992
Springer
154views Cryptology» more  CRYPTO 1992»
14 years 2 months ago
Massively Parallel Computation of Discrete Logarithms
Numerous cryptosystems have been designed to be secure under the assumption that the computation of discrete logarithms is infeasible. This paper reports on an aggressive attempt ...
Daniel M. Gordon, Kevin S. McCurley
CRYPTO
2003
Springer
105views Cryptology» more  CRYPTO 2003»
14 years 4 months ago
On Memory-Bound Functions for Fighting Spam
In 1992, Dwork and Naor proposed that e-mail messages be accompanied by easy-to-check proofs of computational effort in order to discourage junk e-mail, now known as spam. They pro...
Cynthia Dwork, Andrew Goldberg, Moni Naor
CRYPTO
1992
Springer
168views Cryptology» more  CRYPTO 1992»
14 years 2 months ago
Threshold Schemes with Disenrollment
Blakley, Blakley, Chan and Massey conjectured a lower bound on the entropy of broadcast messages in threshold schemes with disenrollment. In an effort to examine the conjecture, w...
Bob Blakley, G. R. Blakley, Agnes Hui Chan, James ...
CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
14 years 2 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali