Results 21 to 30 of about 16,583 (248)

Proving More Observational Equivalences with ProVerif [PDF]

open access: yes, 2012
This paper presents an extension of the automatic protocol verifier ProVerif in order to prove more observational equivalences. ProVerif can prove observational equivalence between processes that have the same structure but differ by the messages they ...
Blanchet, Bruno, Cheval, Vincent
core   +5 more sources

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays

open access: yesCryptography, 2018
Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loaded ...
Don Owen   +6 more
doaj   +1 more source

How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption

open access: yesEntropy, 2021
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj   +1 more source

Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud [PDF]

open access: yesJisuanji gongcheng
Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks.
ZHANG Weihang, ZHONG Yongyan, XIANG Yuanzhu, DING Shichan
doaj   +1 more source

Analysis of Error Dependencies on Newhope

open access: yesIEEE Access, 2020
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song   +5 more
doaj   +1 more source

Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]

open access: yes, 2020
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi   +8 more
core   +1 more source

OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data

open access: yesMathematics, 2023
In many universities, students’ physical ability data are collected and stored in the cloud through various sensing devices to save computational and storage costs.
You Zhao, Ye Fan, Xuefen Bian
doaj   +1 more source

LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate [PDF]

open access: yes, 2019
We consider the QC-LDPC code-based cryptosystems named LEDAcrypt, which are under consideration by NIST for the second round of the post-quantum cryptography standardization initiative. LEDAcrypt is the result of the merger of the key encapsulation mechanism LEDAkem and the public-key cryptosystem LEDApkc, which were submitted to the first round of the
M. Baldi   +4 more
openaire   +1 more source

Study on the parameters of the matrix NTRU cryptosystem

open access: yes河南理工大学学报. 自然科学版
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy