Analysis and design of stream ciphers
Analysis and design of stream ciphers
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Secure communications over insecure channels
Communications of the ACM
Information-Theoretic Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
Journal of Cryptology
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Hi-index | 0.00 |
Existing methods of modelling cryptosystems and their cryptographic security are considered. The construction of cryptographic transformations for Kolmogorov sources of information is investigated. A new computational model of cryptosystems is proposed. New asymmetric cryptosystems are investigated that are ideally resistant in this model.