Sciweavers

FSE
1993
Springer
148views Cryptology» more  FSE 1993»
14 years 1 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
14 years 1 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
FIWAC
1993
139views Cryptology» more  FIWAC 1993»
14 years 1 months ago
Montgomery-Suitable Cryptosystems
Montgomery’s algorithm [8], hereafter denoted Mn(·, ·), is a process for computing Mn(A, B) = ABN mod n where N is a constant factor depending only on n. Usually, AB mod n is o...
David Naccache, David M'Raïhi
FIWAC
1993
153views Cryptology» more  FIWAC 1993»
14 years 1 months ago
New lower bounds for some spherical designs
A new method for obtaining lower bounds for spherical t-designs is proposed. Applications and new bounds are given for t = 9, 10. Some restrictions on the distribution of the inne...
Peter Boyvalenkov, Svetla Nikova
FIWAC
1993
152views Cryptology» more  FIWAC 1993»
14 years 1 months ago
Disjoint Systems (Extended Abstract)
Systems (Extended Abstract) Noga Alon ∗ Benny Sudakov Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel A dis...
Noga Alon, Benny Sudakov
EUROCRYPT
1993
Springer
14 years 1 months ago
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract)
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
EUROCRYPT
1993
Springer
14 years 1 months ago
Differentially Uniform Mappings for Cryptography
This work is motivated by the observation that in DES-like ciphexs it is possible to choose the round functions in such a way that every non-trivial one-round characteristic has sm...
Kaisa Nyberg
EUROCRYPT
1993
Springer
14 years 1 months ago
Untransferable Rights in a Client-Independent Server Environment
A scheme for ensuring access rights untransferability in a client-serverecenario with a central authority and where servers hold no access information about clients is presented in...
Josep Domingo-Ferrer
EUROCRYPT
1993
Springer
14 years 1 months ago
The Breaking of the AR Hash Function
Ivan Damgård, Lars R. Knudsen