Filters








46 Hits in 7.4 sec

Security amplification by composition: The case of doubly-iterated, ideal ciphers [article]

William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
1998 arXiv   pre-print
We obtain the first proof that composition actually increases the security of these constructions in some meaningful sense.  ...  That is, we consider F_k1(F_k2(.)) and F_k1(F_k2^-1(F_k1(.))) with the component functions being ideal ciphers.  ...  Security analysis of the double cipher In this section our goal will be to determine the security of the doubly iterated ideal cipher.  ... 
arXiv:cs/9809031v1 fatcat:xezx7besbfdihgzt6n6adryom4

Security amplification by composition: The case of doubly-iterated, ideal ciphers [chapter]

W. Aiello, M. Bellare, G. Di Crescenzo, R. Venkatesan
1998 Lecture Notes in Computer Science  
We obtain the rst proof that composition actually increases the security in some meaningful sense.  ...  That is, we consider F k1 F k2 and F k1 F ,1 k2 F k1 with the component functions being ideal ciphers.  ...  Security analysis of the double cipher In this section our goal will beto determine the security of the doubly iterated ideal cipher.  ... 
doi:10.1007/bfb0055743 fatcat:i5vf34fglneezkbkjrv3fco7je

Page 7260 of Mathematical Reviews Vol. , Issue 99j [page]

1999 Mathematical Reviews  
[Venkatesan, Ramarathnam] Security amplification by composition: the case of doubly-iterated, ideal ciphers.  ...  We obtain the first proof that composition actually increases the security in some meaningful sense.  ... 

A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers [chapter]

John O. Pliam
2001 Lecture Notes in Computer Science  
We demonstrate the existence of an efficient block cipher with the property that whenever it is composed with any non-perfect cipher, the resulting product is strictly more secure, against an ideal adversary  ...  We call this property universal security amplification, and note that it holds trivially for a one-time pad (a stream cipher).  ...  Acknowledgments I would like to thank Serge Vaudenay for his many insightful comments, and in particular for suggesting the formal computational model of Sect. 2.  ... 
doi:10.1007/3-540-44983-3_13 fatcat:aqu3g3eebzgdtonwl3yr5a3hcq

Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits [chapter]

Nir Bitansky, Alessandro Chiesa
2012 Lecture Notes in Computer Science  
We further show that this variant is, in fact, implied by the existence of SNARKs.  ...  Succinct arguments of knowledge are computationally-sound proofs of knowledge for NP where the verifier's running time is independent of the time complexity of the NP nondeterministic machine for the considered  ...  same as in the corresponding MIP protocol, up to poly(k) factors, where k is the security parameter (and ideally poly(k) is also small.)  ... 
doi:10.1007/978-3-642-32009-5_16 fatcat:je4zuvn23bcfvb5xwzgv3t3zjm

Page 2370 of Mathematical Reviews Vol. 31, Issue Index [page]

Mathematical Reviews  
(with Bellare, Mihir; Di Crescenzo, Giovanni; Venkatesan, Ramarath- nam) Security amplification by composition: the case of doubly-iterated, ideal ciphers.  ...  generated by the polynomial z¢ + (z + 1)¢.  ... 

Page 1829 of Mathematical Reviews Vol. 31, Issue Index [page]

Mathematical Reviews  
(see 99f:68005) 90C10 (90B30) Venkatesan, Ramarathnam (with Aiello, William A.; Bellare, Mihir; Di Crescenzo, Giovanni) Security amplification by composition: the case of doubly-iterated, ideal ciphers  ...  (with Freidlin, Mark I.) * Random perturbations of dynamical systems. (English summary) Translated from the 1979 Russian original by Joseph Sziics. Second edition.  ... 

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
This paper forms the basis of understanding the difficulty of the domain and the amount of efficiency achieved by the various methods recently.  ...  Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death.  ...  option for power generation in the commercial space such that the penetration of this technology into market would improve the energy efficiency and also quality of the environment by decarbonization.  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

Drawing on the Victorians: the palimpsest of Victorian and neo-Victorian graphic texts

Nicole Lobdell
2019 Nineteenth-Century Contexts  
In any case, comic valentines exposed the ugly truth that while the holiday promised to help secure love, marriage, and financial security, it could also produce less pleasant results.  ...  In this case, the caption tethers the punch line to gender difference, exposing the gulf between idealized expectations (the "romantic ideas" of "sentimental" girls) and the harsher realities of masculine  ... 
doi:10.1080/08905495.2019.1569808 fatcat:enlqseqhkfebzgqbwgumkb72xe

Cryptographic Primitives that Resist Backdooring and Subversion

Sogol Mazaheri
2020
We start by modeling backdoored hash functions in the standard model (i.e., a model without idealized primitives), wher [...]  ...  The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security  ...  Other important idealized models used in cryptography are the ideal-cipher model (i.e., idealized block ciphers), random-permutation model (i.e., idealized permutations), and generic-group model (i.e.,  ... 
doi:10.25534/tuprints-00014550 fatcat:ybdjvz3u4fenlcpqrs7rugulcu

Refract Journal, Volume 2: "Translation"

Refract Journal Editorial Board
2019 Refract An Open Access Visual Studies Journal  
In addition to the case records being logged in chronological order with margin summaries, each volume includes a table of the cases sorted by the defendant's name.  ...  The case records also note which judges were present by name, by noting, for example "(present J. H.  ...  Visual studies corrects the problems of art history by offering a different way of seeing and engaging with the world.  ... 
doi:10.5070/r72145897 fatcat:pswqtamgoretticqtesag426em

Television News and Its Satirical Interpretation in Medvedev's Russia: Is Glasnost Back?

Natalia Rulyova
2010 Russian Journal of Communication  
In this case, "moderation" equates to a willingness to keep religious practice and ritual to the private sphere and a commitment to the French constitutional ideal.  ...  In this case, some segments of the social group, e.g. the higher middle class are unrepresented in and substituted by "the pop star" lifestyle.  ...  of a comparative study of European television news representations of Islam as a security threat.  ... 
doi:10.1080/19409419.2010.10756775 fatcat:hwzllch2wjg6bcvo2t54yuevjq

Book Reviews

1957 Science  
No. 52485A Same as above but in cases of 500 dishes 6-14 cases per case $39.60 15=29 cases per case $37.60 per case $44.00 30-249 cases per case $35.75 250 cases per case $34.95 ~ STANDARD SCIENTIFIC =  ...  Indeed, we are doubly fortunate, for a second volume, on the fisheries, has been promised.  ... 
doi:10.1126/science.125.3252.813 fatcat:y46kial6orfzfcapoeortdjtmy

The Invisibility of Juvenal [chapter]

James Uden
2014 The Invisible Satirist  
Attempts to know his true identity are derailed by the absence of autobiographical references, by the jumble of historical and mythological references confounding any secure sense of place and time, and  ...  We are robbed of the illusions and ideals that shape Roman thought, by a recognizably Cynic process of παραχάραξις.  ... 
doi:10.1093/acprof:oso/9780199387274.003.0003 fatcat:7nsrkdpdqrblnkjkvwru5ksqfm

Camilla [chapter]

Ingo Gildenhard, John Henderson
2018 Classics Textbooks  
If the lament for Daphnis (a cipher for Caesar?)  ...  the rhetorical amplification a-swelling.  ...  In the case of immensus … clamor, the hyperbaton underscores the immeasurability of the din that arises; in the case of aurea … sidera, it conveys a sense of even the (unmovable and immobile) golden stars  ... 
doi:10.11647/obp.0158.03 fatcat:ae4x2qpggfg3foxsjux3evmfoe
« Previous Showing results 1 — 15 out of 46 results