نتایج جستجو برای: resilient cryptography

تعداد نتایج: 52839  

Journal: :CoRR 2010
Ochirkhand Erdene-Ochir Marine Minier Fabrice Valois Apostolos A. Kountouris

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In th...

Journal: :IACR transaction on symmetric cryptology 2022

Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard primitives such as block ciphers. Concerning operating modes, Authenticated Encryption with Associated Data (AEAD), the stateof-the-art mainly addresses passive Side-Channel Attacks (SCA) form leakage resilient So far, only h...

Journal: :IACR Cryptology ePrint Archive 2014
Venkata Koppula Omkant Pandey Yannis Rouselakis Brent Waters

Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is an important database encryption technique which allows quick, logarithmic-time, search over encrypted data items. The technique is most effective in scenarios where frequent search queries are performed over a huge database of highly sensitive, yet unpredictable, data items such as credit card ...

2016
Marcin Andrychowicz Stefan Dziembowski Sebastian Faust

The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the adversary. One of the main parameters for designing leakage resilient constructions is the leakage rate, i.e., a proportion between the amount of leaked information and the complexity of the computation carried out by the c...

Journal: :IACR Cryptology ePrint Archive 2015
Qihong Yu Jiguo Li Yichen Zhang Wei Wu Xinyi Huang Yang Xiang

Certificate-based encryption (CBE) is an important class of public key encryption but the existing schemes are secure only under the premise that the decryption key (or private key) and master private key are absolutely secret. In fact, a lot of side channel attacks and cold boot attacks can leak secret information of a cryptographic system. In this case, the security of the cryptographic syste...

2013
Mohammed Hassouna Nashwa Mohamed Eihab Bashier

Providing the security services (authenticity, integrity, confidentiality and non-repudiation) all together in mobile banking has remained a problematic issue for both banks and their customers. Both the public key infrastructure (PKI) and the identity-based public key cryptography (IB-PKC) which have been thought to provide solutions to these security services, have their own limitations. Whil...

2016
B. Pushpa Devi Kh. Manglem Singh Sudipta Roy

This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same ...

Journal: :international journal of transportation engineering 0
hasan taherkhani assistant professor, department of civil engineering, zanjan university, zanjan, iran fereydoon moghadas nejad associate professor, department of civil and environmental engineering, amirkabir industrial university, tehran, iran ali khodaii associate professor, department of civil and environmental engineering, amirkabir industrial university, tehran, iran arash saleh ahari msc. student, department of civil engineering, zanjan university, zanjan, iran

resilient modulus of pavement materials is a key property required for the pavement thickness design. this paper describes the results of an experimental study on the effects of temperature and loading frequency on the resilient modulus of a sbs polymer modified asphalt concrete under dry and saturated conditions. dynamic creep tests were conducted on dry and saturated specimens of the mixture ...

Journal: :IACR Cryptology ePrint Archive 2011
Ivan Damgård Carmit Hazay Arpita Patra

In the traditional secure function evaluation setting, some set of distrusting parties jointly compute a function of their respective inputs securely as if the computation is executed in an ideal setting where the parties send inputs to a trusted party that performs the computation and returns its result. Almost independently of secure computation, the area of leakage resilient cryptography has...

2013
David Galindo Srinivas Vivek

Leakage-resilient cryptography aims at capturing side-channel attacks within the provable security framework. Currently there exists a plethora of schemes with provably secure guarantees against a variety of side-channel attacks. However, meeting the strongest security levels (resilience against continual leakage attacks) under the weakest assumptions leads currently to costly schemes. Addition...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید