نتایج جستجو برای: resilient cryptography

تعداد نتایج: 52839  

Journal: :Communications in Algebra 2014

2010
Ochirkhand Erdene-Ochir Marine Minier Fabrice Valois Apostolos Kountouris

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In th...

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2023

NIST is standardizing Post Quantum Cryptography (PQC) algorithms that are resilient to the computational capability of quantum computers. Past works show malicious subversion with cryptographic software (algorithm attacks) weaken implementations. We PQC digital signature codes can be subverted in line previously reported flawed implementations generate verifiable, but less-secure signatures, de...

Journal: :IEICE Transactions 2015
Eiichiro Fujisaki Akinori Kawachi Ryo Nishimaki Keisuke Tanaka Kenji Yasunaga

Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f (x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient P...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی 1388

چکیده ندارد.

پایان نامه :دانشگاه تربیت معلم - تبریز - دانشکده علوم پایه 1387

چکیده ندارد.

2013
Feng-Hao Liu

of “Error Tolerant Cryptography ” by Feng-Hao Liu, Ph.D., Brown University, April 2013. One of the major goals in cryptography is to design protocols that withstand malicious behavior of an adversary. Traditionally, the focus was on a setting where honest users followed their protocol exactly, without fault. But what if an adversary can induce faults, for example a physical attack that changes ...

Journal: :Science China Information Sciences 2021

Abstract We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum (PQC) and information-theoretic security. From cryptographic point view, lattice code-based schemes are among the most promising PQC solutions. Both approaches based hardness decoding problems linear codes different metrics. lattices can be constructed to achieve certain secrecy quantities for wireta...

Journal: :IEEE Access 2023

The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation recent years. Since messages shared among vehicles are always broadcasted by openness environment’ nature, which is vulnerable to several privacy and security problems. To cope with this issue, researchers have proposed pseudonym authentication schemes for the 5G-enabled network. Ne...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده علوم ریاضی 1389

چکیده ندارد.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید