Sciweavers

ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
13 years 12 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
ASIACRYPT
2009
Springer
13 years 12 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
14 years 1 hour ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
EUROCRYPT
1987
Springer
14 years 1 days ago
Sequences With Almost Perfect Linear Complexity Profile
Sequences with almost perfect linear complexity profile are defined by H. Niederreiter[4]. C.P. Xing and K.Y. Lam[5, 6] extended this concept from the case of single sequences to ...
Harald Niederreiter
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
14 years 2 days ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
CRYPTO
1989
Springer
70views Cryptology» more  CRYPTO 1989»
14 years 2 days ago
One Way Hash Functions and DES
Ralph C. Merkle
ASIACRYPT
1990
Springer
14 years 2 days ago
Parallel Generation of Pseudo-Random Sequences
Reihaneh Safavi-Naini
EUROCRYPT
1991
Springer
14 years 2 days ago
Boolean Functions Satisfying Higher Order Propagation Criteria
Boolean functions that satisfy higher order propagation criteria are studied. A complete characterization is given of the autocorrelation function and Walsh spectrum of second ord...
Bart Preneel, René Govaerts, Joos Vandewall...
EUROCRYPT
1991
Springer
14 years 2 days ago
Discrete Logarithm Based Protocols
Patrick Horster, Hans-Joachim Knobloch