A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security amplification by composition: The case of doubly-iterated, ideal ciphers
[article]
1998
arXiv
pre-print
We obtain the first proof that composition actually increases the security of these constructions in some meaningful sense. ...
That is, we consider F_k1(F_k2(.)) and F_k1(F_k2^-1(F_k1(.))) with the component functions being ideal ciphers. ...
Security analysis of the double cipher In this section our goal will be to determine the security of the doubly iterated ideal cipher. ...
arXiv:cs/9809031v1
fatcat:xezx7besbfdihgzt6n6adryom4
Security amplification by composition: The case of doubly-iterated, ideal ciphers
[chapter]
1998
Lecture Notes in Computer Science
We obtain the rst proof that composition actually increases the security in some meaningful sense. ...
That is, we consider F k1 F k2 and F k1 F ,1 k2 F k1 with the component functions being ideal ciphers. ...
Security analysis of the double cipher In this section our goal will beto determine the security of the doubly iterated ideal cipher. ...
doi:10.1007/bfb0055743
fatcat:i5vf34fglneezkbkjrv3fco7je
Page 7260 of Mathematical Reviews Vol. , Issue 99j
[page]
1999
Mathematical Reviews
[Venkatesan, Ramarathnam] Security amplification by composition: the case of doubly-iterated, ideal ciphers. ...
We obtain the first proof that composition actually increases the security in some meaningful sense. ...
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
[chapter]
2001
Lecture Notes in Computer Science
We demonstrate the existence of an efficient block cipher with the property that whenever it is composed with any non-perfect cipher, the resulting product is strictly more secure, against an ideal adversary ...
We call this property universal security amplification, and note that it holds trivially for a one-time pad (a stream cipher). ...
Acknowledgments I would like to thank Serge Vaudenay for his many insightful comments, and in particular for suggesting the formal computational model of Sect. 2. ...
doi:10.1007/3-540-44983-3_13
fatcat:aqu3g3eebzgdtonwl3yr5a3hcq
Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits
[chapter]
2012
Lecture Notes in Computer Science
We further show that this variant is, in fact, implied by the existence of SNARKs. ...
Succinct arguments of knowledge are computationally-sound proofs of knowledge for NP where the verifier's running time is independent of the time complexity of the NP nondeterministic machine for the considered ...
same as in the corresponding MIP protocol, up to poly(k) factors, where k is the security parameter (and ideally poly(k) is also small.) ...
doi:10.1007/978-3-642-32009-5_16
fatcat:je4zuvn23bcfvb5xwzgv3t3zjm
Page 2370 of Mathematical Reviews Vol. 31, Issue Index
[page]
Mathematical Reviews
(with Bellare, Mihir; Di Crescenzo, Giovanni; Venkatesan, Ramarath- nam) Security amplification by composition: the case of doubly-iterated, ideal ciphers. ...
generated by the polynomial z¢ + (z + 1)¢. ...
Page 1829 of Mathematical Reviews Vol. 31, Issue Index
[page]
Mathematical Reviews
(see 99f:68005) 90C10 (90B30)
Venkatesan, Ramarathnam (with Aiello, William A.; Bellare, Mihir; Di Crescenzo, Giovanni) Security amplification by composition: the case of doubly-iterated, ideal ciphers ...
(with Freidlin, Mark I.) * Random perturbations of dynamical systems. (English summary) Translated from the 1979 Russian original by Joseph Sziics. Second edition. ...
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
This paper forms the basis of understanding the difficulty of the domain and the amount of efficiency achieved by the various methods recently. ...
Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death. ...
option for power generation in the commercial space such that the penetration of this technology into market would improve the energy efficiency and also quality of the environment by decarbonization. ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
Drawing on the Victorians: the palimpsest of Victorian and neo-Victorian graphic texts
2019
Nineteenth-Century Contexts
In any case, comic valentines exposed the ugly truth that while the holiday promised to help secure love, marriage, and financial security, it could also produce less pleasant results. ...
In this case, the caption tethers the punch line to gender difference, exposing the gulf between idealized expectations (the "romantic ideas" of "sentimental" girls) and the harsher realities of masculine ...
doi:10.1080/08905495.2019.1569808
fatcat:enlqseqhkfebzgqbwgumkb72xe
Cryptographic Primitives that Resist Backdooring and Subversion
2020
We start by modeling backdoored hash functions in the standard model (i.e., a model without idealized primitives), wher [...] ...
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security ...
Other important idealized models used in cryptography are the ideal-cipher model (i.e., idealized block ciphers), random-permutation model (i.e., idealized permutations), and generic-group model (i.e., ...
doi:10.25534/tuprints-00014550
fatcat:ybdjvz3u4fenlcpqrs7rugulcu
Refract Journal, Volume 2: "Translation"
2019
Refract An Open Access Visual Studies Journal
In addition to the case records being logged in chronological order with margin summaries, each volume includes a table of the cases sorted by the defendant's name. ...
The case records also note which judges were present by name, by noting, for example "(present J. H. ...
Visual studies corrects the problems of art history by offering a different way of seeing and engaging with the world. ...
doi:10.5070/r72145897
fatcat:pswqtamgoretticqtesag426em
Television News and Its Satirical Interpretation in Medvedev's Russia: Is Glasnost Back?
2010
Russian Journal of Communication
In this case, "moderation" equates to a willingness to keep religious practice and ritual to the private sphere and a commitment to the French constitutional ideal. ...
In this case, some segments of the social group, e.g. the higher middle class are unrepresented in and substituted by "the pop star" lifestyle. ...
of a comparative study of European television news representations of Islam as a security threat. ...
doi:10.1080/19409419.2010.10756775
fatcat:hwzllch2wjg6bcvo2t54yuevjq
Book Reviews
1957
Science
No. 52485A Same as above but in cases of 500 dishes
6-14 cases per case $39.60 15=29 cases per case $37.60
per case $44.00 30-249 cases per case $35.75
250 cases per case $34.95
~ STANDARD SCIENTIFIC
= ...
Indeed, we are doubly fortunate, for a second volume, on the fisheries, has been promised. ...
doi:10.1126/science.125.3252.813
fatcat:y46kial6orfzfcapoeortdjtmy
The Invisibility of Juvenal
[chapter]
2014
The Invisible Satirist
Attempts to know his true identity are derailed by the absence of autobiographical references, by the jumble of historical and mythological references confounding any secure sense of place and time, and ...
We are robbed of the illusions and ideals that shape Roman thought, by a recognizably Cynic process of παραχάραξις. ...
doi:10.1093/acprof:oso/9780199387274.003.0003
fatcat:7nsrkdpdqrblnkjkvwru5ksqfm
Camilla
[chapter]
2018
Classics Textbooks
If the lament for Daphnis (a cipher for Caesar?) ...
the rhetorical amplification a-swelling. ...
In the case of immensus … clamor, the hyperbaton underscores the immeasurability of the din that arises; in the case of aurea … sidera, it conveys a sense of even the (unmovable and immobile) golden stars ...
doi:10.11647/obp.0158.03
fatcat:ae4x2qpggfg3foxsjux3evmfoe
« Previous
Showing results 1 — 15 out of 46 results