Open AccessBook
Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems
Reads0
Chats0
TLDR
Presents the theory and methodology for implementing a useable security system and covers applications in the fields of data communications, data processing, and data storage.Abstract:
Presents the theory and methodology for implementing a useable security system. Covers applications in the fields of data communications, data processing, and data storage.read more
Citations
More filters
Book ChapterDOI
A Digital Signature Based on a Conventional Encryption Function
TL;DR: A new digital signature based only on a conventional encryption function (such as DES) is described which is as secure as the underlying encryption function -- the security does not depend on the difficulty of factoring and the high computational costs of modular arithmetic are avoided.
Proceedings ArticleDOI
OCB: a block-cipher mode of operation for efficient authenticated encryption
TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
Journal ArticleDOI
Cryptographic solution to a problem of access control in a hierarchy
Selim G. Akl,Peter D. Taylor +1 more
TL;DR: Security class (or class, for short) is used to design a sy s t em which, in add i t i on to sa t i s fy ing the above condi t ions, will be able to retrieve xm independent ly as soon as it is stored or broadcast by CA.
BookDOI
Advances in Cryptology — CRYPTO’ 88
TL;DR: In this article, it was shown that the implication that if one-way permutations exist, then secure secret key agreement is possible, is not provable by standard techniques, since both sides of this implication are widely believed true in real life.
Book ChapterDOI
A Tweakable Enciphering Mode
TL;DR: A block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2.