Results 251 to 260 of about 3,543,901 (295)
Some of the next articles are maybe not open access.

Distal Facial Nerve Exposure: A Key to Partial Parotidectomy

Otolaryngology–Head and Neck Surgery, 2008
Objective1) Learn techniques and outcomes of distal facial nerve identification compared with antegrade exposure in partial parotidectomy. 2) Be able to incorporate other modifications of parotidectomy facilitated by distal facial n. isolation including preservation of the greater auricular nerve, superficial musculo‐aponeurotic system (SMAS), and ...
Wang, Robert C.   +3 more
openaire   +3 more sources

Protecting against key-exposure: strongly key-insulated encryption with optimal threshold

Applicable Algebra in Engineering, Communication and Computing, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bellare, Mihir, Palacio, Adriana
openaire   +1 more source

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage

Information Sciences, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chengyu Hu   +5 more
openaire   +2 more sources

Efficient online/offline signcryption without key exposure

International Journal of Grid and Utility Computing, 2013
An online/offline signcryption scheme provides confidentiality and authentication simultaneously, and it is particularly suitable for the application of resource-constrained systems. In this paper, we present a key-exposure free online/offline signcryption scheme.
Fei Yan, Xiaofeng Chen, Yinghui Zhang
openaire   +1 more source

Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem

2007
Standard identity-based cryptosystems typically rely on the assumption that secret keys are kept perfectly secure. However, in practice, there are two threats to the key security in identity-based cryptosystems. One inherent problem is key escrow, that is, the Key Generation Center (KGC) always knows a user's secret key and the malicious KGC can ...
Jin Wang, Xi Bai, Jia Yu, Daxing Li
openaire   +1 more source

Security of NewHope Under Partial Key Exposure

2020
Recently, the work of Bolboceanu et al. (Asiacrypt ’19) and the work of Dachman Soled et al. (Mathcrypt ’19) have studied a leakage model that assumes leakage of some fraction of the NTT coordinates of the secret key in RLWE cryptosystems (or equivalently, intentionally sampling secrets with some fraction of NTT coordinates set to 0).
Dana Dachman-Soled   +3 more
openaire   +1 more source

Partial Key Exposure Attack on CRT-RSA

2009
Consider CRT-RSA with N = pq , q < p < 2q , public encryption exponent e and private decryption exponents d p , d q . Jochemsz and May (Crypto 2007) presented that CRT-RSA is weak when d p , d q are smaller than N 0.073. As a follow-up work of that paper, we study the partial key exposure attack on CRT-RSA when some Most Significant Bits (MSBs) of d p ,
Santanu Sarkar, Subhamoy Maitra
openaire   +1 more source

Partial Key Exposure Attack on CRT-RSA

2014
In Eurocrypt 2005, Ernst et al. proposed an attack on RSA allowing to recover the secret key when the most or least significant bits of the decryption exponent \(d\) are known. In Indocrypt 2011, Sarkar generalized this by considering the number of unexposed blocks in the decryption exponent is more than one. In this paper, for the first time, we study
Santanu Sarkar, Ayineedi Venkateswarlu
openaire   +1 more source

Securing Cloud Information under Key Exposure

The emerging growth of internet users facilitate various edge devices accessed by the global peoples. The benefit of fast network usage provides enormous task to get done within short span of time. Since the massive network rely on various third party cloud services, the impact of malicious attacks are more. To detect and mitigate the malicious attacks
Jeffin Gracewell J   +3 more
openaire   +1 more source

Defending against key exposure in attribute-based encryption

International Journal of Ad Hoc and Ubiquitous Computing, 2014
Since the notion of attribute-based encryption (ABE) was proposed, it has been found a lot of important applications such as fine-grained access control. However, the issue of key exposure problem in ABE has been solved completely. This problem is formally addressed and formulated in this paper. More specifically, we propose a new key-insulated ABE (KI-
J. Li, X. Chen, H. Tian, C. Gao
openaire   +1 more source

Home - About - Disclaimer - Privacy