Sciweavers

FSE
1993
Springer
148views Cryptology» more  FSE 1993»
14 years 21 days ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
14 years 21 days ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
FIWAC
1993
139views Cryptology» more  FIWAC 1993»
14 years 21 days ago
Montgomery-Suitable Cryptosystems
Montgomery’s algorithm [8], hereafter denoted Mn(·, ·), is a process for computing Mn(A, B) = ABN mod n where N is a constant factor depending only on n. Usually, AB mod n is o...
David Naccache, David M'Raïhi
FIWAC
1993
153views Cryptology» more  FIWAC 1993»
14 years 21 days ago
New lower bounds for some spherical designs
A new method for obtaining lower bounds for spherical t-designs is proposed. Applications and new bounds are given for t = 9, 10. Some restrictions on the distribution of the inne...
Peter Boyvalenkov, Svetla Nikova
FIWAC
1993
152views Cryptology» more  FIWAC 1993»
14 years 21 days ago
Disjoint Systems (Extended Abstract)
Systems (Extended Abstract) Noga Alon ∗ Benny Sudakov Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel A dis...
Noga Alon, Benny Sudakov
EUROCRYPT
1993
Springer
14 years 21 days ago
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract)
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
EUROCRYPT
1993
Springer
14 years 21 days ago
Differentially Uniform Mappings for Cryptography
This work is motivated by the observation that in DES-like ciphexs it is possible to choose the round functions in such a way that every non-trivial one-round characteristic has sm...
Kaisa Nyberg
EUROCRYPT
1993
Springer
14 years 21 days ago
Untransferable Rights in a Client-Independent Server Environment
A scheme for ensuring access rights untransferability in a client-serverecenario with a central authority and where servers hold no access information about clients is presented in...
Josep Domingo-Ferrer
EUROCRYPT
1993
Springer
14 years 21 days ago
The Breaking of the AR Hash Function
Ivan Damgård, Lars R. Knudsen