Sciweavers

ACISP
2000
Springer
13 years 12 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski
ACISP
2000
Springer
13 years 12 months ago
Security Weaknesses in a Randomized Stream Cipher
Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata...
Niels Ferguson, Bruce Schneier, David Wagner
ACISP
2000
Springer
13 years 12 months ago
Two-Stage Optimisation in the Design of Boolean Functions
This paper shows how suitable choice of cost function can significantly affect the power of optimisation methods for the synthesising of Boolean functions. In particular we show ...
John A. Clark, Jeremy Jacob
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 8 hour ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
SP
2000
IEEE
112views Security Privacy» more  SP 2000»
14 years 8 hour ago
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keyin...
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 8 hour ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
SP
2000
IEEE
115views Security Privacy» more  SP 2000»
14 years 8 hour ago
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 8 hour ago
Robust Nonproprietary Software
Peter G. Neumann
SP
2000
IEEE
14 years 8 hour ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
SP
2000
IEEE
14 years 8 hour ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan