Results 31 to 40 of about 505,863 (290)
A Probabilistic Encryption Way in Knapsack PKC
Zuxi Wang, Yu Baimu
openalex +2 more sources
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption
Jinyu Tian, Jiantao Zhou, Jia Duan
openaire +2 more sources
Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham +6 more
doaj +1 more source
Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj +1 more source
In this paper, a high-security probabilistic constellation shaping transmission scheme based on recurrent neural networks (RNNs) is proposed, in which the constellation point probabilistic distribution is generated based on recurrent neural network ...
Shuyu Zhou +13 more
doaj +1 more source
Fair Data Transactions Across Private Databases
In this era of big data, data transactions are becoming more frequent and bringing new benefits for both data buyers and providers. However, there are no data transaction schemes to satisfy the special security and business requirements of data ...
Wei Yuan
doaj +1 more source
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes
Recently, new paradigms for designing modern cryptographic schemes were proposed based on Rubik's rotations. However, most of them lack rigorous provable security reductions.
Ping Pan +3 more
doaj +1 more source
Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance
Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of ...
Vincenzo Agate +5 more
doaj +1 more source
RSA algoritam i njegova praktična primena / RSA algorithm
RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ...
Sonja R. Kuljanski
doaj +1 more source
Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms
N. Priya, Dr. M. Kannan
openaire +2 more sources

