Results 251 to 260 of about 2,456,516 (297)
Some of the next articles are maybe not open access.
Key Recovery — Möglichkeiten und Risiken
Informatik-Spektrum, 1998Dieser Beitrag untersucht verschiedene Moglichkeiten zur Wiederherstellung verschlusselter Daten, ohne das ein direkter Zugriff auf den vom intendierten Nutzer zur Entschlusselung verwendeten Schlussel besteht, und vergleicht sie hinsichtlich ihrer sicherheitstechnischen Eigenschaften.
openaire +1 more source
Good-bye key escrow, hello key recovery
Computer Fraud & Security, 1996Abstract On 2 October 1996, IBM announced the formation of a new business alliance which will develop a different approach to law enforcement — accessible encryption that will not face government export controls or require the ‘escrowing’ of keys with either escrow ‘quote agents’ or trusted third parties.
openaire +1 more source
Proceedings of the 14th International Conference on Computer Systems and Technologies, 2013
With the increased use of encryption in business, key recovery has emerged as a critical issue to users. As encryption is deployed to protect files and network communications, users must include safeguards that prevent the inadvertent loss of data and use of the network for malicious intent.
openaire +1 more source
With the increased use of encryption in business, key recovery has emerged as a critical issue to users. As encryption is deployed to protect files and network communications, users must include safeguards that prevent the inadvertent loss of data and use of the network for malicious intent.
openaire +1 more source
Global Interoperability for Key Recovery
Computers & Security, 2000This document describes techniques for implementing key recovery. The document then addresses interoperability between encryptors and decryptors using the key encapsulation method of key recovery. The Common Key Recovery Block is presented as a cornerstone for interoperability.
Chuck Williams, Nevenko Zunic
openaire +1 more source
Computers & Security, 2000
When cryptographic products that employ different key recovery mechanisms need to interoperate with one another, one of the major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product.
openaire +1 more source
When cryptographic products that employ different key recovery mechanisms need to interoperate with one another, one of the major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product.
openaire +1 more source
Key recovery for the commercial environment
2002Summary: We propose an efficient, scalable, certification-based key recovery system that is a hybrid of the key escrow and key encapsulation techniques. The proposed key recovery system is highly flexible and can be employed in a variety of policy environments. It possesses the properties required for commercial key recovery systems. We demonstrate the
Gonzalez Nieto, Juan +4 more
openaire +1 more source
Practical Key Recovery Schemes
2001In this paper,the Bell Labs key recovery scheme is extensively modified to enable a user to request on-line key recovery service when the file decryption key is forgotten or lost. New practical and important requirements of key recovery are also considered in the proposed schemes, for example, the key recovery server and any intruder over the ...
openaire +1 more source
Computers & Security, 2000
This document describes a mechanism for transmitting a key recovery header (KRH) within an IPSEC datagram. The KRH is normally inserted following the AH header and before the ESP header. The Key Recovery Header was designed to be compatible with IETF's IPSEC Architecture.
Tom Markham, Chuck Williams
openaire +1 more source
This document describes a mechanism for transmitting a key recovery header (KRH) within an IPSEC datagram. The KRH is normally inserted following the AH header and before the ESP header. The Key Recovery Header was designed to be compatible with IETF's IPSEC Architecture.
Tom Markham, Chuck Williams
openaire +1 more source
2017
At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a single low degree polynomial in the central map is replaced by a pair of high degree polynomials with a low degree cubic polynomial contained in the ideal they generate.
Daniel Cabarcas +2 more
openaire +1 more source
At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a single low degree polynomial in the central map is replaced by a pair of high degree polynomials with a low degree cubic polynomial contained in the ideal they generate.
Daniel Cabarcas +2 more
openaire +1 more source

