Results 31 to 40 of about 505,863 (290)

A Probabilistic Encryption Way in Knapsack PKC

open access: hybridAdvances in Intelligent Systems Research, 2013
Zuxi Wang, Yu Baimu
openalex   +2 more sources

Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)

open access: yesIEEE Access, 2023
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham   +6 more
doaj   +1 more source

Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems

open access: yesБезопасность информационных технологий, 2021
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj   +1 more source

A High-Security Probabilistic Constellation Shaping Transmission Scheme Based on Recurrent Neural Networks

open access: yesPhotonics, 2023
In this paper, a high-security probabilistic constellation shaping transmission scheme based on recurrent neural networks (RNNs) is proposed, in which the constellation point probabilistic distribution is generated based on recurrent neural network ...
Shuyu Zhou   +13 more
doaj   +1 more source

Fair Data Transactions Across Private Databases

open access: yesIEEE Access, 2020
In this era of big data, data transactions are becoming more frequent and bringing new benefits for both data buyers and providers. However, there are no data transaction schemes to satisfy the special security and business requirements of data ...
Wei Yuan
doaj   +1 more source

Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes

open access: yesIEEE Access, 2020
Recently, new paradigms for designing modern cryptographic schemes were proposed based on Rubik's rotations. However, most of them lack rigorous provable security reductions.
Ping Pan   +3 more
doaj   +1 more source

Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance

open access: yesIEEE Access, 2023
Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of ...
Vincenzo Agate   +5 more
doaj   +1 more source

RSA algoritam i njegova praktična primena / RSA algorithm

open access: yesVojnotehnički Glasnik, 2010
RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ...
Sonja R. Kuljanski
doaj   +1 more source

Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms

open access: yesInternational Journal Of Engineering And Computer Science, 2017
N. Priya, Dr. M. Kannan
openaire   +2 more sources

Home - About - Disclaimer - Privacy