Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/225058.225080acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Incremental cryptography and application to virus protection

Published: 29 May 1995 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    A. AHO, J. ULLMAN, AND J. HOPCROFT. The de-sign and analysis of computer algorithms. Addison-Wesley, 1974.]]
    [2]
    M. AJTAI, J. KOMM5S AND E. SZEMEF&DI. An O(n log n) sorting network. STOC 83.]]
    [3]
    K. BATCHER. Sorting networks and their applica-tions. AFIPS Spring Joint Computer Conference 32, 1968.]]
    [4]
    M. BELLARE, O. GOLDREICH AND S. GOLDWASSEFt. Increment al cryptography: The case of hashing and signing. Crypto 94.]]
    [5]
    M. BELLARE, R. GtiRIN AND P. ROGAWAY. XOR MACS: New methods for message authentication us-ing block ciphers. Manuscript, March 1994.]]
    [6]
    M. BELLARE, J. KILIAN AND P. ROGAWAY. The security of cipher block chaining. Crypto 94.]]
    [7]
    M. BELLMW AND P. ROGAWAY. Entity authentic. tion and key distribution. Crypto 93.]]
    [8]
    L. CARTER AND M. WE~MAN. Universal Classes of Hash Functions. J. Computer and System Sciences 18, 143-154, 1979.]]
    [9]
    O. GOLDREICH. Towards a Theory of Software Protection and Simulation by Oblivious RAMs. STOC 87.]]
    [10]
    0. GOLDREICH, S. GOLDWASSEE, AND S. MICALI. How to construct random functions. Journal of the ACM, vol. 33, No. 4, 210-217, 1986.]]
    [11]
    S. GOLDWASSEFL AND S. MICALI, Probabilistic en-cryption. J. of Computer and System Sciences 28, 270-299, April 1984.]]
    [12]
    S. GOLDWASSER, S. MICALI AND R. RIVEST. A digit al signature scheme secure against adaptive chosen-message attacks. SIAM t7cwrrmJ of Comput-ing, 17(2):281-308, April 1988.]]
    [13]
    R. KARP AND M. RABIN. Efficient randomized pat-tern matching algorithms. IBM J'. of Research and Development Vol. 31, No. 2, March 1987.]]
    [14]
    R. MERKLE, A certified digital signature scheme. Crypto 89.]]
    [15]
    R. MERKLE. Protocols for public key cryptosystems. Proceedings of the 1980 Symposium on Security and Privacy.]]
    [16]
    R. OSTROVSKY. Efficient Computations on Oblivi-ous RAMs. STOC 90.]]
    [17]
    R. RIVEST, The MD5 message-digest algorithm. IE'I'F Network Working Group, RFC 1321, April 1992.]]

    Cited By

    View all
    • (2024)IoT data security in outsourced databases: A survey of verifiable databaseHeliyon10.1016/j.heliyon.2024.e2811710:7(e28117)Online publication date: Apr-2024
    • (2024)Review of VLSI Architecture of Cryptography Algorithm for IOT SecurityProceedings of the 6th International Conference on Communications and Cyber Physical Engineering10.1007/978-981-99-7137-4_9(103-112)Online publication date: 5-Feb-2024
    • (2023)Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel CachingProceedings of the ACM on Management of Data10.1145/35889201:1(1-23)Online publication date: 30-May-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
    May 1995
    776 pages
    ISBN:0897917189
    DOI:10.1145/225058
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 May 1995

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    STOC95
    Sponsor:
    STOC95: Symposium on Theory of Computing
    May 29 - June 1, 1995
    Nevada, Las Vegas, USA

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)91
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)IoT data security in outsourced databases: A survey of verifiable databaseHeliyon10.1016/j.heliyon.2024.e2811710:7(e28117)Online publication date: Apr-2024
    • (2024)Review of VLSI Architecture of Cryptography Algorithm for IOT SecurityProceedings of the 6th International Conference on Communications and Cyber Physical Engineering10.1007/978-981-99-7137-4_9(103-112)Online publication date: 5-Feb-2024
    • (2023)Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel CachingProceedings of the ACM on Management of Data10.1145/35889201:1(1-23)Online publication date: 30-May-2023
    • (2022)Authenticated Encryption Schemes: A Systematic ReviewIEEE Access10.1109/ACCESS.2022.314720110(14739-14766)Online publication date: 2022
    • (2022)Securing Surveillance Data Using Incremental CryptographyProceedings of the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021)10.1007/978-3-030-96302-6_20(216-225)Online publication date: 22-Feb-2022
    • (2021)Lightweight Cryptography for Network-on-Chip Data EncryptionSecurity and Communication Networks10.1155/2021/99437132021Online publication date: 1-Jan-2021
    • (2021)A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-HealthcareSecurity and Communication Networks10.1155/2021/93638242021Online publication date: 1-Jan-2021
    • (2021)Parallel incremental attribute-based encryption for mobile cloud data storage and sharingJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-020-02842-xOnline publication date: 3-Jan-2021
    • (2021)Unintended Features of APIs: Cryptanalysis of Incremental HMACSelected Areas in Cryptography10.1007/978-3-030-81652-0_12(301-325)Online publication date: 21-Jul-2021
    • (2021)Updatable Signatures and Message Authentication CodesPublic-Key Cryptography – PKC 202110.1007/978-3-030-75245-3_25(691-723)Online publication date: 1-May-2021
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media