نتایج جستجو برای: security sense

تعداد نتایج: 322501  

Journal: :IACR Cryptology ePrint Archive 2006
Ronald Cramer Dennis Hofheinz Eike Kiltz

Designing public key encryption schemes withstanding chosen ciphertext attacks, which is the highest security level for such schemes, is generally perceived as a delicate and intricate task, and for good reason. In the standard model, there are essentially three well-known but quite involved approaches. This state of affairs is to be contrasted with the situation for semantically secure encrypt...

2000
Todor Dimitrov

While opinions differ when reviewing factors of economic stability and development, there is clearly a common endorsement of the belief that economic stability is linked to security. Therefore, addressing the issue of security in Albania and Ukraine, speakers actually focused on the search for solutions to the severe economic problems of these countries. Indeed, “economic security is constructi...

2010
Ahto Buldas Margus Niitsoo

We study the security of hash-then-publish time-stamping schemes and concentrate on the tightness of security reductions from the collision-resistance of the underlying hash functions. While the previous security reductions create a quadratic loss in the security in terms of time-success ratio of the adversary being protected against, this paper achieves a notably smaller loss of power 1.5. Thi...

2002
John Black Phillip Rogaway Thomas Shrimpton

Encryption that is only semantically secure should not be used on messages that depend on the underlying secret key; all bets are off when, for example, one encrypts using a shared key K the value K. Here we introduce a new notion of security, KDM security, appropriate for key-dependent messages. The notion makes sense in both the public-key and shared-key settings. For the latter we show that ...

Journal: :IACR Cryptology ePrint Archive 2000
Anand Desai Sara Miner More

We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the concrete complexity of the reductions between the standard notions and the alternate ones, we show that the latter, while equivalent under polynomial-time reductions, are weaker in the concrete security sense. With these altern...

Journal: :IACR Cryptology ePrint Archive 2013
Emmanuel Prouff Matthieu Rivain Thomas Roche

At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter construction into an efficient masking scheme and they apply it to protect an implementation of AES against side-channel attacks [1]. The so-called Inner-Product masking (IP masking for short) was claimed to ...

2011
Ruoyi Jiang Brian Quanz Hongliang Fei Jun Huan

This effort focused on improving transportation security by making the objects (e.g. containers) being transported active agents in their own protection. Here, the objects are equipped with sensing and communication capabilities and are able to determine and communicate their sense of security throughout the dynamic transportation chain in a distributed manner. As part of the project, we have d...

2011
Gary J. Minden Victor S. Frost Joseph B. Evans Jun Huan Ruoyi Jiang Leon S. Searl Dan DePardo Ed Komp Martin Kuehnhausen

This effort focused on improving transportation security by making the objects (e.g. containers) being transported active agents in their own protection. Here, the objects are equipped with sensing and communication capabilities and are able to determine and communicate their sense of security throughout the dynamic transportation chain in a distributed manner. As part of the project, we have d...

Journal: :IACR Cryptology ePrint Archive 2015
Felix Heuer Tibor Jager Eike Kiltz Sven Schäge

We show that two well-known and widely employed public-key encryption schemes – RSA Optimal Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Standard (DHIES), the latter one instantiated with a one-time pad, – are secure under (the strong, simulation-based security notion of) selective opening security against chosen-ciphertext attacks in the random oracle model...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید