scispace - formally typeset
Open AccessBook

Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems

Reads0
Chats0
TLDR
Presents the theory and methodology for implementing a useable security system and covers applications in the fields of data communications, data processing, and data storage.
Abstract
Presents the theory and methodology for implementing a useable security system. Covers applications in the fields of data communications, data processing, and data storage.

read more

Citations
More filters
Book ChapterDOI

A Digital Signature Based on a Conventional Encryption Function

TL;DR: A new digital signature based only on a conventional encryption function (such as DES) is described which is as secure as the underlying encryption function -- the security does not depend on the difficulty of factoring and the high computational costs of modular arithmetic are avoided.
Proceedings ArticleDOI

OCB: a block-cipher mode of operation for efficient authenticated encryption

TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
Journal ArticleDOI

Cryptographic solution to a problem of access control in a hierarchy

TL;DR: Security class (or class, for short) is used to design a sy s t em which, in add i t i on to sa t i s fy ing the above condi t ions, will be able to retrieve xm independent ly as soon as it is stored or broadcast by CA.
BookDOI

Advances in Cryptology — CRYPTO’ 88

TL;DR: In this article, it was shown that the implication that if one-way permutations exist, then secure secret key agreement is possible, is not provable by standard techniques, since both sides of this implication are widely believed true in real life.
Book ChapterDOI

A Tweakable Enciphering Mode

TL;DR: A block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2.
Related Papers (5)