#### Filter Results:

- Full text PDF available (18)

#### Publication Year

1965

2010

- This year (0)
- Last 5 years (0)
- Last 10 years (2)

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Richard Schroeppel, Adi Shamir
- SIAM J. Comput.
- 1981

- Niels Ferguson, Richard Schroeppel, Doug Whiting
- Selected Areas in Cryptography
- 2001

We show that there is a very straightforward closed algebraic formula for the Rijndael block cipher. This formula is highly structured and far simpler then algebraic formulations of any other block cipher we know. The security of Rijndael depends on a new and untested hardness assumption: it is computationally infeasible to solve equations of this type. The… (More)

The Diie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the eld F 2 n. A software version of this using n = 155 can be optimized to achieve computation rates that are signiicantly faster than non-elliptic curve versions with a similar level of security. The fast computation of reciprocals in F 2 n is… (More)

- Don Coppersmith, Andrew M. Odlyzko, Richard Schroeppel
- Algorithmica
- 1986

Several related algorithms are presented for computing logarithms in fieldsGF(p),p a prime. Heuristic arguments predict a running time of exp((1+o(1)) $$\sqrt {\log p \log \log p} $$ ) for the initial precomputation phase that is needed for eachp, and much shorter running times for computing individual logarithms once the precomputation is done. The running… (More)

Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000.

- Hilarie Orman, Sean O’Malley, Richard Schroeppel, David Schwartz
- 1994

Software subsystems that implement cryptographic security features can be built from small modules using uniform interfaces. The methods demonstrated in this paper illustrate how configuration flexibility can be achieved and how complex services can be constructed, all using the same building block modules. These allow the configuration process to be… (More)

Security and privacy are growing concerns in the Internet community, due to the Internet's rapid growth and the desire to conduct business over it safely. This desire has led to the advent of several proposals for security standards, such as secure IP, secure HTTP, and the Secure Socket Layer. All of these standards propose using cryptographic protocols… (More)

- Richard Schroeppel, Adi Shamir
- FOCS
- 1979

With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various security policies on network communications. This paper discusses our implementation of several previously proposed protocols that enforce the Bell LaPadula security model. We also introduce a new protocol called \Quantized Pump"… (More)