Results 11 to 20 of about 186,193 (271)

Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments

open access: yesSensors, 2021
Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security.
Taehoon Kim   +3 more
doaj   +1 more source

Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

open access: yesIEEE Access, 2023
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures ...
Tung-Tso Tsai   +2 more
doaj   +1 more source

Does modularity undermine the pro‐emotion consensus? [PDF]

open access: yes, 2020
There is a growing consensus that emotions contribute positively to human practical rationality. While arguments that defend this position often appeal to the modularity of emotion-generation mechanisms, these arguments are also susceptible to the ...
Majeed, Raamy
core   +1 more source

Key encapsulation mechanism based on polar codes

open access: yesIET Communications, 2022
This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms.
Reza Hooshmand, Mahdi Khoshfekr
doaj   +1 more source

Bit Flipping Key Encapsulation for the Post-Quantum Era

open access: yesIEEE Access, 2023
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi   +3 more
doaj   +1 more source

Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

open access: yesIEEE Open Journal of the Computer Society, 2020
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries.
Jui-Di Wu   +3 more
doaj   +1 more source

Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism

open access: yesTongxin xuebao, 2023
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU   +4 more
doaj   +2 more sources

A Constant-time AVX2 Implementation of a Variant of ROLLO

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj   +1 more source

Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature

open access: yesIET Information Security, 2021
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue   +3 more
doaj   +1 more source

Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications

open access: yesSensors, 2021
Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping Key
Pavol Zajac
doaj   +1 more source

Home - About - Disclaimer - Privacy