Sciweavers

15 search results - page 2 / 3
» isw 2007
Sort
View
ISW
2007
Springer
14 years 3 months ago
Specifying Imperative Data Obfuscations
Abstract. An obfuscation aims to transform a program, without affecting the functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Clark D. Thomborson, Anirban Majumd...
ISW
2007
Springer
14 years 3 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
ISW
2007
Springer
14 years 3 months ago
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle at...
Joo Yeon Cho, Josef Pieprzyk
ISW
2007
Springer
14 years 3 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames
ISW
2007
Springer
14 years 3 months ago
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports an...
Debra L. Cook, Moti Yung, Angelos D. Keromytis