Results 251 to 260 of about 3,543,901 (295)
Some of the next articles are maybe not open access.
Distal Facial Nerve Exposure: A Key to Partial Parotidectomy
Otolaryngology–Head and Neck Surgery, 2008Objective1) Learn techniques and outcomes of distal facial nerve identification compared with antegrade exposure in partial parotidectomy. 2) Be able to incorporate other modifications of parotidectomy facilitated by distal facial n. isolation including preservation of the greater auricular nerve, superficial musculo‐aponeurotic system (SMAS), and ...
Wang, Robert C. +3 more
openaire +3 more sources
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
Applicable Algebra in Engineering, Communication and Computing, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bellare, Mihir, Palacio, Adriana
openaire +1 more source
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
Information Sciences, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chengyu Hu +5 more
openaire +2 more sources
Efficient online/offline signcryption without key exposure
International Journal of Grid and Utility Computing, 2013An online/offline signcryption scheme provides confidentiality and authentication simultaneously, and it is particularly suitable for the application of resource-constrained systems. In this paper, we present a key-exposure free online/offline signcryption scheme.
Fei Yan, Xiaofeng Chen, Yinghui Zhang
openaire +1 more source
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem
2007Standard identity-based cryptosystems typically rely on the assumption that secret keys are kept perfectly secure. However, in practice, there are two threats to the key security in identity-based cryptosystems. One inherent problem is key escrow, that is, the Key Generation Center (KGC) always knows a user's secret key and the malicious KGC can ...
Jin Wang, Xi Bai, Jia Yu, Daxing Li
openaire +1 more source
Security of NewHope Under Partial Key Exposure
2020Recently, the work of Bolboceanu et al. (Asiacrypt ’19) and the work of Dachman Soled et al. (Mathcrypt ’19) have studied a leakage model that assumes leakage of some fraction of the NTT coordinates of the secret key in RLWE cryptosystems (or equivalently, intentionally sampling secrets with some fraction of NTT coordinates set to 0).
Dana Dachman-Soled +3 more
openaire +1 more source
Partial Key Exposure Attack on CRT-RSA
2009Consider CRT-RSA with N = pq , q < p < 2q , public encryption exponent e and private decryption exponents d p , d q . Jochemsz and May (Crypto 2007) presented that CRT-RSA is weak when d p , d q are smaller than N 0.073. As a follow-up work of that paper, we study the partial key exposure attack on CRT-RSA when some Most Significant Bits (MSBs) of d p ,
Santanu Sarkar, Subhamoy Maitra
openaire +1 more source
Partial Key Exposure Attack on CRT-RSA
2014In Eurocrypt 2005, Ernst et al. proposed an attack on RSA allowing to recover the secret key when the most or least significant bits of the decryption exponent \(d\) are known. In Indocrypt 2011, Sarkar generalized this by considering the number of unexposed blocks in the decryption exponent is more than one. In this paper, for the first time, we study
Santanu Sarkar, Ayineedi Venkateswarlu
openaire +1 more source
Securing Cloud Information under Key Exposure
The emerging growth of internet users facilitate various edge devices accessed by the global peoples. The benefit of fast network usage provides enormous task to get done within short span of time. Since the massive network rely on various third party cloud services, the impact of malicious attacks are more. To detect and mitigate the malicious attacksJeffin Gracewell J +3 more
openaire +1 more source
Defending against key exposure in attribute-based encryption
International Journal of Ad Hoc and Ubiquitous Computing, 2014Since the notion of attribute-based encryption (ABE) was proposed, it has been found a lot of important applications such as fine-grained access control. However, the issue of key exposure problem in ABE has been solved completely. This problem is formally addressed and formulated in this paper. More specifically, we propose a new key-insulated ABE (KI-
J. Li, X. Chen, H. Tian, C. Gao
openaire +1 more source

