Hyper-En ryption against Spa e-Bounded Adversaries from On-Line Strong Extra tors

نویسنده

  • Chi-Jen Lu
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ááê Èööòø Ö Blockinú ¾¼¼¼»¼¼¼º Òòðý××× Óó Øøø Ïïòòòô Ò Blockinöýôøøóò Ññøøó

Analysis of the WinZip en ryption method Tadayoshi Kohno May 8, 2004 Abstra t WinZip is a popular ompression utility for Mi rosoft Windows omputers, the latest version of whi h is advertised as having \easy-to-use AES en ryption to prote t your sensitive data." We exhibit several atta ks against WinZip's new en ryption method, dubbed \AE-2" or \Advan ed En ryption, version two." We then dis uss...

متن کامل

Ååååòò Aeìêííò Blockinöýôø Òò Aeìêíëëëò × Ëë Blockinùöö × Ëøøòòòöö Ïóö×ø¹¹¹×× Èöóóððñ× Óúö Ááááð Ääøøø Blockin Blockin×

Abstra t. NTRUEn rypt, proposed in 1996 by Ho stein, Pipher and Silverman, is the fastest known latti e-based en ryption s heme. Its moderate key-sizes, ex ellent asymptoti performan e and onje tured resistan e to quantum omputers make it a desirable alternative to fa torisation and dis rete-log based en ryption s hemes. However, sin e its introdu tion, doubts have regularly arisen on its se ur...

متن کامل

Ùøøøòøø Blockin Blockinøøø Ò Blockinöýôøøóò Ò Øøø Èùùðð Blockin¹ããý Ëëøøøòòò Ëë Blockinùööøý Aeóøøóò× Òò Òòðý×××

Se urity Notions and Analyses Jee Hea An Abstra t This paper addresses the se urity of authenti ated en ryption s hemes in the publi key setting. We present two new notions of authenti ity that are stronger than the integrity notions given in the symmetri setting [5℄. We also show that hoseniphertext atta k se urity (IND-CCA) in the publi key setting is not obtained in general from the ombinati...

متن کامل

Eecient Algorithms for Learning to Play Repeated Games against Computationally Bounded Adversaries

We study the problem of eeciently learning to play a game optimally against an unknown adversary chosen from a computationally bounded class. We both contribute to the line of research on playing games against nite automata, and expand the scope of this research by considering new classes of adversaries. We introduce the natural notions of games against recent history adversaries (whose current...

متن کامل

Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors

We study the problem of information-theoretically secure encryption in the bounded-storage model introduced by Maurer [10]. The sole assumption of this model is a limited storage bound on an eavesdropper Eve, who is even allowed to be computationally unbounded. Suppose a sender Alice and a receiver Bob agreed on a short private key beforehand, and there is a long public random string accessible...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002