Sciweavers

JOC
1998
162views more  JOC 1998»
13 years 11 months ago
A Software-Optimized Encryption Algorithm
We describe a software-e cient encryption algorithm named SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudo...
Phillip Rogaway, Don Coppersmith
JOC
1998
76views more  JOC 1998»
13 years 11 months ago
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation
Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesa...
JOC
1998
117views more  JOC 1998»
13 years 11 months ago
An Analysis of SAFER
We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z-module. In particular we consider the invariant Z-submodules ...
Sean Murphy
JOC
1998
135views more  JOC 1998»
13 years 11 months ago
Attacks on Fast Double Block Length Hash Functions
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where k ≤ m, is considered. New attacks are presented on a large ...
Lars R. Knudsen, Xuejia Lai, Bart Preneel