Results 1 to 10 of about 26,946 (315)

Advances of Provable Security Techniques [PDF]

open access: greenJournal of Universal Computer Science, 2019
Advances of Provable Security ...
Yong Yu, Yi Mu
doaj   +6 more sources

Provable Security for Outsourcing Database Operations [PDF]

open access: greenInternational Journal of Information Security and Privacy, 2010
Database outsourcing has become popular in recent years, although it introduces substantial security and privacy risks. In many applications, users may not want to reveal their data even to a generally trusted database service provider. Several researchers have proposed encryption schemes, such as privacy homomorphisms, that allow service providers to ...
Сергей Евдокимов   +2 more
  +9 more sources

Provable security against generic attacks on stream ciphers [PDF]

open access: goldJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +2 more sources

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2018
In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in
Lanjun Dang   +6 more
doaj   +2 more sources

On the provable security of BEAR and LION schemes [PDF]

open access: greenApplicable Algebra in Engineering, Communication and Computing, 2011
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function.
L. Maines   +3 more
openalex   +5 more sources

Another Look at "Provable Security" [PDF]

open access: bronzeJournal of Cryptology, 2005
We give an informal analysis and critique of several typical "provable security" results. In some cases there are intuitive but convincing arguments for rejecting the conclusions suggested by the formal terminology and "proofs," whereas in other cases the formalism seems to be consistent with common sense.
Neal Koblitz, Alfred Menezes
openalex   +2 more sources

Why Provable Security Matters? [PDF]

open access: bronze, 2003
Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging standards. This in turn has led researchers as well as practitioners to raise some concerns about this methodology.
Jacques Stern
openalex   +4 more sources

Fundamental problems in provable security and cryptography [PDF]

open access: greenPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2006
This paper examines methods for formally proving the security of cryptographic schemes. We show that, despite many years of active research and dozens of significant results, there are fundamental problems which have yet to be solved. We also present a new approach to one of the more controversial aspects of provable security, the random oracle model.
Alexander W. Dent
openalex   +4 more sources

Generalized Feistel Structures Based on Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2022
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseudorandom functions (PRFs). Coron et al. at TCC 2010 instantiated a Feistel structure with a tweakable block cipher (TBC), and presented its provable ...
Kazuki Nakaya, Tetsu Iwata
doaj   +1 more source

Home - About - Disclaimer - Privacy