Results 261 to 270 of about 3,543,901 (295)
Some of the next articles are maybe not open access.

Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience

2016
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE schemes assumed that the user’s secret key is absolutely secure.
Libo He   +3 more
openaire   +1 more source

Partial Key Exposure Attacks on RSA with Exponent Blinding

2016
Partial key exposure attacks, introduced by Boneh, Durfee and Frankel in 1998, aim at retrieving an RSA private key when a fraction of its bits is known. These attacks are of particular interest in the context of side-channel attacks, where the attacker can retrieve bits of the key exploiting leakages in the implementation.
S. Cimato, S. Mella, R. Susella
openaire   +2 more sources

Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption

2006
A proposal for key exposure resilient cryptography called, key-insulated public key encryption (KIPE), has been proposed by Dodis, Katz, Xu, and Yung [6] in which the secret key is changed over time so that the exposure of current key minimizes the damage overall.
Thi Lan Anh Phan   +4 more
openaire   +1 more source

An Evaluation: RSA Private Key Exposure Impacts All Key Vulnerabilities

2023 6th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2023
Martin Suhartana, Emny Harna Yossy
openaire   +1 more source

Adaptive Event‐Driven Key Management for Securing Cloud Data Against Key Exposure

Concurrency and Computation: Practice and Experience
ABSTRACT Ensuring data confidentiality and integrity in dynamic cloud storage environments is a growing challenge, particularly in the face of key exposure threats. Traditional key management schemes, which rely on periodic updates, introduce significant vulnerabilities due to long windows of exposure between key rotations.
Atul Kumar Singh, Kriti Bhushan
openaire   +1 more source

Partial key exposure attack on RSA using some private key blocks

Journal of Computer Virology and Hacking Techniques, 2023
Santosh Kumar Ravva   +2 more
openaire   +1 more source

Exposure Assessment: A Key Issue in Aquatic Toxicology

1979
Environmental exposure assessment, an intermediate step in risk analysis, ties projected volumes of toxic materials entering the environment to specific environmental effects. Thus, prediction of the environmental fate and distribution of a toxic compound is an integral part of any hierarchical scheme of risk analysis.
openaire   +1 more source

Key Exposure in Cloud Data Services

International Journal of Big Data Security Intelligence, 2018
openaire   +1 more source

Partial Key Exposure: Generalized Framework to Attack RSA

2011
In the domain of modern public key cryptography, RSA is the most popular system in use. Efficient factorization of the RSA modulus N, constituted as a product of two primes p, q of ‘large' bitsize, is a challenging problem in RSA cryptanalysis. The solution to this factorization is aided if the attacker gains partial knowledge about the decryption ...
openaire   +1 more source

Protecting against Partial Key Exposure in Key-Insulated Encryption

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Kyoichi ASANO   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy