Practical byzantine fault tolerance and proactive recovery
M Castro, B Liskov - ACM Transactions on Computer Systems (TOCS), 2002 - dl.acm.org
Our growing reliance on online services accessible on the Internet demands highly
available systems that provide correct service without interruptions. Software bugs, operator …
available systems that provide correct service without interruptions. Software bugs, operator …
Security flaws induced by CBC padding—applications to SSL, IPSEC, WTLS...
S Vaudenay - International Conference on the Theory and …, 2002 - Springer
In many standards, eg SSL/TLS, IPSEC, WTLS, messages are first pre-formatted, then
encrypted in CBC mode with a block cipher. Decryption needs to check if the format is valid …
encrypted in CBC mode with a block cipher. Decryption needs to check if the format is valid …
On the security of randomized CBC-MAC beyond the birthday paradox limit a new construction
É Jaulmes, A Joux, F Valette - International Workshop on Fast Software …, 2002 - Springer
In this paper, we study the security of randomized CBC-MACs and propose a new
construction that resists birthday paradox attacks and provably reaches full security. The size …
construction that resists birthday paradox attacks and provably reaches full security. The size …
Cellular automata based authentication (CAA)
M Mukherjee, N Ganguly, PP Chaudhuri - International Conference on …, 2002 - Springer
Current demands for secured communication have focussed intensive interest on
'Authentication'. There is a great demand for a highspeed low cost scheme for generation of …
'Authentication'. There is a great demand for a highspeed low cost scheme for generation of …
Integrity-aware mode of stream cipher
S Furuya, D Watanabe, Y Seto… - IEICE transactions on …, 2002 - search.ieice.org
In many cryptographic protocols, a common-key encryption is used to provide a secure data-
transmission channel. More precisely, the general idea of protocols is to have an encryption …
transmission channel. More precisely, the general idea of protocols is to have an encryption …
Message authentication for stream
H Kuwakado, H Tanaka - IEICE transactions on fundamentals of …, 2002 - search.ieice.org
The function of a message authentication code (MAC) is to verify the validity of a whole
message. The disadvantage of usual MACs is that a receiver can not check its validity until …
message. The disadvantage of usual MACs is that a receiver can not check its validity until …
[PDF][PDF] of Deliverable SECURITY EVALUATION OF
S Murphy, J White - the NESSIE project - academia.edu
Project Number IST-1999-12324 Project Title NESSIE Deliverable Type Report Security Class
Public Deliverable Number D13 Title of Page 1 Project Number IST-1999-12324 Project Title …
Public Deliverable Number D13 Title of Page 1 Project Number IST-1999-12324 Project Title …