B Morris, P Rogaway, T Stegers - Annual International Cryptology …, 2009 - Springer
We analyze the security of the Thorp shuffle, or, equivalently, a maximally unbalanced Feistel network. Roughly said, the Thorp shuffle on N cards mixes any N 1− 1/r of them in …
DH Phan, D Pointcheval - International Workshop on Selected Areas in …, 2004 - Springer
Probabilistic symmetric encryption have already been widely studied, from a theoretical point of view. Nevertheless, many applications require length-preserving encryption, to be …
I Goldberg - International Workshop On Privacy Enhancing …, 2006 - Springer
Tor is a popular anonymous Internet communication system, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor …
M Bellare, VT Hoang - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce identity-based format-preserving encryption (IB-FPE) as a way to localize and limit the damage to format-preserving encryption (FPE) from key exposure. We give …
Block ciphers are widely used building blocks for secure communication systems; their purpose is to ensure confidentiality of the data exchanged through such systems, while …
P Dillenbourg - Sciences et techniques éducatives, 1994 - edutice.hal.science
Le concept de connaissance a fortement évolué au cours des dernières années. La connaissance n'est plus perçue comme une substance, mais comme une capacité à …
PP Tsang, RV Solomakhin, SW Smith - 2009 - digitalcommons.dartmouth.edu
Abstract In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the next input block is received. In this paper, we introduce Authenticated …
B Morris, P Rogaway, T Stegers - Journal of Cryptology, 2018 - Springer
We analyze the security of the Thorp shuffle, or, equivalently, a maximally unbalanced Feistel network. Roughly said, the Thorp shuffle on N cards mixes any N^ 1-1/r N 1-1/r of …
La sécurité prouvée est une branche relativement jeune de la cryptologie dont l'objectif est d'analyser formellement le but ultime des schémas cryptographiques: la sécurité. Elle ne …