Results 271 to 280 of about 10,030,622 (339)
Some of the next articles are maybe not open access.

A key recovery scheme

Proceedings of the 14th International Conference on Computer Systems and Technologies, 2013
With the increased use of encryption in business, key recovery has emerged as a critical issue to users. As encryption is deployed to protect files and network communications, users must include safeguards that prevent the inadvertent loss of data and use of the network for malicious intent.
openaire   +1 more source

An Efficient Key Recovery Attack on SIDH

International Conference on the Theory and Application of Cryptographic Techniques, 2023
W. Castryck, Thomas Decru
semanticscholar   +1 more source

Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets

2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
Recent years have seen an increased interest in digital wallets for a multitude of use cases including online banking, cryptocurrency, and digital identity management. Digital wallets play a pivotal role in the secure management of cryptographic keys and
Reza Soltani, U. T. Nguyen, Aijun An
semanticscholar   +1 more source

SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes

IACR Cryptology ePrint Archive, 2023
Qian Guo   +3 more
semanticscholar   +1 more source

A Key Recovery Reaction Attack on QC-MDPC

IEEE Transactions on Information Theory, 2019
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community. One of the most promising such algorithms is the code-based scheme called QC-MDPC, which has excellent performance and a small ...
Qian Guo   +2 more
semanticscholar   +1 more source

Global Interoperability for Key Recovery

Computers & Security, 2000
This document describes techniques for implementing key recovery. The document then addresses interoperability between encryptors and decryptors using the key encapsulation method of key recovery. The Common Key Recovery Block is presented as a cornerstone for interoperability.
Chuck Williams, Nevenko Zunic
openaire   +1 more source

Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato

IACR Cryptology ePrint Archive, 2023
Lorenzo Grassi   +5 more
semanticscholar   +1 more source

A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms

Computers & Security, 2000
When cryptographic products that employ different key recovery mechanisms need to interoperate with one another, one of the major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product.
openaire   +1 more source

Key recovery for the commercial environment

2002
Summary: We propose an efficient, scalable, certification-based key recovery system that is a hybrid of the key escrow and key encapsulation techniques. The proposed key recovery system is highly flexible and can be employed in a variety of policy environments. It possesses the properties required for commercial key recovery systems. We demonstrate the
Gonzalez Nieto, Juan   +4 more
openaire   +1 more source

Quantum Linear Key-recovery Attacks Using the QFT

IACR Cryptology ePrint Archive, 2023
A. Schrottenloher
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy