Results 11 to 20 of about 58,616 (313)
ENCRYPTION AND DECRYPTION IN COMPLEX PARALLELISM
To design a substitutin box (S-BOX) using both encryption and decryption. From that, the proposed system can achieve a higher throughput and higher energy efficiency. The S-BOX is designed by using Advanced Encryption Standard (AES). The AES is a symmetric key standard for encryption and decryption of blocks of data.
Christo Ananth, H.Anusuya Baby
openalex +4 more sources
Symmetric Blind Decryption with Perfect Secrecy [PDF]
A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message. Such schemes are useful, for example, for the implementation of privacy-preserving encrypted file storages and payment systems. In terms of functionality, blind decryption is close to oblivious transfer. For
Juha Partala
openalex +7 more sources
On the Effectiveness of Ransomware Decryption Tools [PDF]
Ransomware is a type of malware that locks out its victim’s access to their device or data – typically by encrypting files – and demands payment in exchange of restoring access. To fight the increasing threat posed by ransomware, security researchers and practitioners have developed decryption tools.
Burak Filiz+3 more
openalex +5 more sources
Decryption of historical manuscripts: the DECRYPT project [PDF]
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B.+9 more
openaire +4 more sources
Decryption of tissue factor [PDF]
Tissue factor (TF) is a transmembrane protein which, in complex with factor (F)VIIa, initiates blood coagulation. Numerous studies have determined TF epitopes and individual amino acids which play an important role in the TF/FVIIa complex formation and its activity towards natural substrates.
Saulius Butenas, Jolanta Krudysz-Amblo
openaire +2 more sources
Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany+1 more
doaj +1 more source
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad+17 more
core +2 more sources
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent+6 more
core +2 more sources
Subverting Decryption in AEAD [PDF]
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Schemes. ASAs were introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance ...
Marcel Armour, Bertram Poettering
openaire +3 more sources
Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen+3 more
doaj +1 more source