Results 1 to 10 of about 26,946 (315)
Advances of Provable Security Techniques [PDF]
Advances of Provable Security ...
Yong Yu, Yi Mu
doaj +6 more sources
Provable Security for Outsourcing Database Operations [PDF]
Database outsourcing has become popular in recent years, although it introduces substantial security and privacy risks. In many applications, users may not want to reveal their data even to a generally trusted database service provider. Several researchers have proposed encryption schemes, such as privacy homomorphisms, that allow service providers to ...
Сергей Евдокимов +2 more
+9 more sources
Provable security against generic attacks on stream ciphers [PDF]
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj +2 more sources
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks [PDF]
In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in
Lanjun Dang +6 more
doaj +2 more sources
On the provable security of BEAR and LION schemes [PDF]
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function.
L. Maines +3 more
openalex +5 more sources
Another Look at "Provable Security" [PDF]
We give an informal analysis and critique of several typical "provable security" results. In some cases there are intuitive but convincing arguments for rejecting the conclusions suggested by the formal terminology and "proofs," whereas in other cases the formalism seems to be consistent with common sense.
Neal Koblitz, Alfred Menezes
openalex +2 more sources
Why Provable Security Matters? [PDF]
Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging standards. This in turn has led researchers as well as practitioners to raise some concerns about this methodology.
Jacques Stern
openalex +4 more sources
Fundamental problems in provable security and cryptography [PDF]
This paper examines methods for formally proving the security of cryptographic schemes. We show that, despite many years of active research and dozens of significant results, there are fundamental problems which have yet to be solved. We also present a new approach to one of the more controversial aspects of provable security, the random oracle model.
Alexander W. Dent
openalex +4 more sources
Password-only authenticated three-party key exchange with provable security in the standard model. [PDF]
Nam J +6 more
europepmc +3 more sources
Generalized Feistel Structures Based on Tweakable Block Ciphers
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseudorandom functions (PRFs). Coron et al. at TCC 2010 instantiated a Feistel structure with a tweakable block cipher (TBC), and presented its provable ...
Kazuki Nakaya, Tetsu Iwata
doaj +1 more source

