Results 31 to 40 of about 493,090 (289)

Fair Data Transactions Across Private Databases

open access: yesIEEE Access, 2020
In this era of big data, data transactions are becoming more frequent and bringing new benefits for both data buyers and providers. However, there are no data transaction schemes to satisfy the special security and business requirements of data ...
Wei Yuan
doaj   +1 more source

Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes

open access: yesIEEE Access, 2020
Recently, new paradigms for designing modern cryptographic schemes were proposed based on Rubik's rotations. However, most of them lack rigorous provable security reductions.
Ping Pan   +3 more
doaj   +1 more source

Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance

open access: yesIEEE Access, 2023
Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of ...
Vincenzo Agate   +5 more
doaj   +1 more source

RSA algoritam i njegova praktična primena / RSA algorithm

open access: yesVojnotehnički Glasnik, 2010
RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ...
Sonja R. Kuljanski
doaj   +1 more source

A New Probabilistic Encryption Scheme [PDF]

open access: yes, 2007
In this paper we present a new probabilistic public key cryptosystem. The system is polynomially secure. Furthermore, it is highly efficient in that it's message expansion is l+(k-1)/1, where k is the security parameter and l the length of the encrypted message. Finally, the system can be used to sign signatures.
L. Kaicheng, H. Jingmin
openaire   +2 more sources

3D PCDM Probabilistic Shaping Transmission Scheme Based on Chaotic Constellation Mapping

open access: yesIEEE Photonics Journal, 2023
In this article, a high-security three-dimensional (3D) probabilistic shaping optical transmission system based on prefix-free code distribution matching (PCDM) and Polar code joint coding is proposed.
Mengjie Wu   +13 more
doaj   +1 more source

Pindex: Private multi-linked index for encrypted document retrieval.

open access: yesPLoS ONE, 2021
Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating.
A John Prakash, B Lydia Elizabeth
doaj   +1 more source

Stream Deniable-Encryption Algorithms [PDF]

open access: yesComputer Science Journal of Moldova, 2016
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher.
N.A. Moldovyan   +3 more
doaj  

Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms [PDF]

open access: yesJournal of Universal Computer Science, 2019
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several ...
Yuan Chen   +4 more
doaj   +3 more sources

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

open access: yesIEEE Access, 2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy