Results 261 to 270 of about 3,543,901 (295)
Some of the next articles are maybe not open access.
2016
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE schemes assumed that the user’s secret key is absolutely secure.
Libo He +3 more
openaire +1 more source
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE schemes assumed that the user’s secret key is absolutely secure.
Libo He +3 more
openaire +1 more source
Partial Key Exposure Attacks on RSA with Exponent Blinding
2016Partial key exposure attacks, introduced by Boneh, Durfee and Frankel in 1998, aim at retrieving an RSA private key when a fraction of its bits is known. These attacks are of particular interest in the context of side-channel attacks, where the attacker can retrieve bits of the key exploiting leakages in the implementation.
S. Cimato, S. Mella, R. Susella
openaire +2 more sources
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption
2006A proposal for key exposure resilient cryptography called, key-insulated public key encryption (KIPE), has been proposed by Dodis, Katz, Xu, and Yung [6] in which the secret key is changed over time so that the exposure of current key minimizes the damage overall.
Thi Lan Anh Phan +4 more
openaire +1 more source
An Evaluation: RSA Private Key Exposure Impacts All Key Vulnerabilities
2023 6th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2023Martin Suhartana, Emny Harna Yossy
openaire +1 more source
Adaptive Event‐Driven Key Management for Securing Cloud Data Against Key Exposure
Concurrency and Computation: Practice and ExperienceABSTRACT Ensuring data confidentiality and integrity in dynamic cloud storage environments is a growing challenge, particularly in the face of key exposure threats. Traditional key management schemes, which rely on periodic updates, introduce significant vulnerabilities due to long windows of exposure between key rotations.
Atul Kumar Singh, Kriti Bhushan
openaire +1 more source
Partial key exposure attack on RSA using some private key blocks
Journal of Computer Virology and Hacking Techniques, 2023Santosh Kumar Ravva +2 more
openaire +1 more source
Exposure Assessment: A Key Issue in Aquatic Toxicology
1979Environmental exposure assessment, an intermediate step in risk analysis, ties projected volumes of toxic materials entering the environment to specific environmental effects. Thus, prediction of the environmental fate and distribution of a toxic compound is an integral part of any hierarchical scheme of risk analysis.
openaire +1 more source
Key Exposure in Cloud Data Services
International Journal of Big Data Security Intelligence, 2018openaire +1 more source
Partial Key Exposure: Generalized Framework to Attack RSA
2011In the domain of modern public key cryptography, RSA is the most popular system in use. Efficient factorization of the RSA modulus N, constituted as a product of two primes p, q of ‘large' bitsize, is a challenging problem in RSA cryptanalysis. The solution to this factorization is aided if the attacker gains partial knowledge about the decryption ...
openaire +1 more source
Protecting against Partial Key Exposure in Key-Insulated Encryption
IEICE Transactions on Fundamentals of Electronics, Communications and Computer SciencesKyoichi ASANO +2 more
openaire +1 more source

