Results 41 to 50 of about 493,090 (289)

Provably sender-deniable encryption scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2015
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the
N.A. Moldovyan   +2 more
doaj  

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures

open access: yesIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +1 more source

Post-quantum commutative encryption algorithm [PDF]

open access: yesComputer Science Journal of Moldova, 2019
To provide possibility to design the commutative encryption algorithms on the basis of new versions of the hidden discrete logarithm problem, the term "commutativity" is interpreted in the extended sense.
A.A. Moldovyan   +2 more
doaj  

Hybrid-structured onion scheme against replay attack of MIX

open access: yesTongxin xuebao, 2009
Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay ...
SHI Jin-qiao   +3 more
doaj   +2 more sources

High-Security Multi-Slot Chaos Encryption With Dynamic Probability for 16-CAP PON

open access: yesIEEE Photonics Journal, 2020
In this paper, a high-security chaos encryption with dynamic probability for 16-carrier-less amplitude/phase (CAP) PON is proposed by using two-layer chaos map with feedforward neural network-based XOR operator (FNNXOR).
Shun han   +8 more
doaj   +1 more source

2-bit, chained, probabilistic encryption scheme

open access: yesElectronics Letters, 1989
In this letter we present a new probabilistic encryption algorithm based on the scheme proposed by Jingmin and Kaicheng in 1988. This algorithm utilises the public key concept and recursively encrypts two bits at a time. The message bit expansion is very low and is the same as in their scheme. At the same time, this new scheme is twice as fast.
Lein Harn, T. Kiesler
openaire   +2 more sources

From lactation to malignancy: A comparison between healthy and cancerous breast gland at single‐cell resolution reveals new issues for tumorigenesis

open access: yesFEBS Letters, EarlyView.
Single‐cell RNA sequencing reveals an opposite role of SLPI in basal tumors based on metastatic spread, along with shared activation of specific regulons in cancer cells and mature luminal lactocytes, as well as downregulation of MALAT1 and NEAT1 in the latter.
Pietro Ancona   +4 more
wiley   +1 more source

Relating two standard notions of secrecy [PDF]

open access: yesLogical Methods in Computer Science, 2007
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
Veronique Cortier   +2 more
doaj   +1 more source

Linked dimers of the AAA+ ATPase Msp1 reveal energetic demands and mechanistic plasticity for substrate extraction from lipid bilayers

open access: yesFEBS Letters, EarlyView.
Cells must clear mislocalized or faulty proteins from membranes to survive. The AAA+ ATPase Msp1 performs this task, but dissecting how its six subunits work together is challenging. We engineered linked dimers with varied numbers of functional subunits to reveal how Msp1 subunits cooperate and use energy to extract proteins from the lipid bilayer ...
Deepika Gaur   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy