Results 271 to 280 of about 10,030,622 (339)
Some of the next articles are maybe not open access.
Proceedings of the 14th International Conference on Computer Systems and Technologies, 2013
With the increased use of encryption in business, key recovery has emerged as a critical issue to users. As encryption is deployed to protect files and network communications, users must include safeguards that prevent the inadvertent loss of data and use of the network for malicious intent.
openaire +1 more source
With the increased use of encryption in business, key recovery has emerged as a critical issue to users. As encryption is deployed to protect files and network communications, users must include safeguards that prevent the inadvertent loss of data and use of the network for malicious intent.
openaire +1 more source
An Efficient Key Recovery Attack on SIDH
International Conference on the Theory and Application of Cryptographic Techniques, 2023W. Castryck, Thomas Decru
semanticscholar +1 more source
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019Recent years have seen an increased interest in digital wallets for a multitude of use cases including online banking, cryptocurrency, and digital identity management. Digital wallets play a pivotal role in the secure management of cryptographic keys and
Reza Soltani, U. T. Nguyen, Aijun An
semanticscholar +1 more source
A Key Recovery Reaction Attack on QC-MDPC
IEEE Transactions on Information Theory, 2019Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community. One of the most promising such algorithms is the code-based scheme called QC-MDPC, which has excellent performance and a small ...
Qian Guo +2 more
semanticscholar +1 more source
Global Interoperability for Key Recovery
Computers & Security, 2000This document describes techniques for implementing key recovery. The document then addresses interoperability between encryptors and decryptors using the key encapsulation method of key recovery. The Common Key Recovery Block is presented as a cornerstone for interoperability.
Chuck Williams, Nevenko Zunic
openaire +1 more source
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
IACR Cryptology ePrint Archive, 2023Lorenzo Grassi +5 more
semanticscholar +1 more source
Computers & Security, 2000
When cryptographic products that employ different key recovery mechanisms need to interoperate with one another, one of the major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product.
openaire +1 more source
When cryptographic products that employ different key recovery mechanisms need to interoperate with one another, one of the major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product.
openaire +1 more source
Key recovery for the commercial environment
2002Summary: We propose an efficient, scalable, certification-based key recovery system that is a hybrid of the key escrow and key encapsulation techniques. The proposed key recovery system is highly flexible and can be employed in a variety of policy environments. It possesses the properties required for commercial key recovery systems. We demonstrate the
Gonzalez Nieto, Juan +4 more
openaire +1 more source
Quantum Linear Key-recovery Attacks Using the QFT
IACR Cryptology ePrint Archive, 2023A. Schrottenloher
semanticscholar +1 more source

