نتایج جستجو برای: encryption

تعداد نتایج: 27368  

2015
Peter Shah Won So

Many storage customers are adopting encryption solutions to protect critical data. Most existing encryption solutions sit in, or near, the application that is the source of critical data, upstream of the primary storage system. Placing encryption near the source ensures that data remains encrypted throughout the storage stack, making it easier to use untrusted storage, such as public clouds. Un...

Journal: :Entropy 2015
Piyush Kumar Shukla Ankur Khare Murtaza Abbas Rizvi Shalini Stalin Sanjay Kumar

Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed...

2000
Jonathan Katz Moti Yung

We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally held to the same standard of security as public-key encryption (i.e., indistinguishability) even though usage of the two is very different. Secondly, though the importance of secure encryption of single blocks is well known, the security of modes of encryption (used to e...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 2002
Ramesh Karri Kaijie Wu Piyush Mishra Yongkook Kim

Fault-based side-channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy-based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overheads (either area or performance). The authors investigate systematic approaches to low-cost low-latency CED tec...

2014
Jiarui Huang Min Zhang Weixin Chen Yi-Shiuan Tung

This paper gives an overview of the research that has been done on computing on encrypted data, namely fully homomorphic encryption (FHE) and functional encryption (FE). We first describe public-key encryption schemes and then provide a background and motivation for FHE and FE. We then outline the ideas of the FHE and FE encryption schemes and security. We also tested the performance of a curre...

2004
Gustav Boström

Encryption is an important method for implementing confidentiality in information systems. Unfortunately applying encryption effectively can be quite complicated. Encryption, as well as other security concerns, is also often spread out in an application making implementation difficult. This crosscutting nature of encryption makes it a potentially ideal candidate for implementation using AOP. In...

Journal: :The Computer Science Journal of Moldova 2015
Nikolay A. Moldovyan Alexander A. Moldovyan Victor Scerbacov

The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the roots of which are two simultaneously encrypted texts. One of the texts is a fake message and the other one is a ciphertext produced by public-...

Journal: :IACR Cryptology ePrint Archive 2012
Rajeswari Mukesh

Image compression and image encryption are pivotal to proper storage and transmission of images over MANET. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The Number Theory based Image Compression and Quasigroup Encryption (NTICQE) algorithm employs number theoretic paradigm Chinese Remainder Theorem and Quasigroup E...

2011
Mintu Philip Asha Das

Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, the...

2010
Kai Xi Jiankun Hu

7.1 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 7.1.1 Overview of Cryptography . . . . . . . . . . . 130 7.1.2 Symmetric-Key Cryptography . . . . . . . . 130 7.1.3 Substitution and Transposition Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.1.4 Data Encryption Standard (DES) . . . . . 133 7.1.5 Advanced Encryption Standard (AES) . 134 7.1.6 Public...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید