Results 21 to 30 of about 1,527 (301)

On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary tweak(ey) size kn for all k ≥ 1, and arbitrary number of rounds r ≥ 2.
Benoît Cogliati   +3 more
doaj   +1 more source

Provably Secure Reflection Ciphers

open access: yes, 2022
sponsorship: This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). Tim Beyne and Yu Long Chen are supported by a Ph.D. Fellowship from the Research Foundation -Flanders (FWO). The authors thank the reviewers for their valuable comments and suggestions.
Beyne, Tim, Chen, Yu Long
openaire   +1 more source

Enabling image optimisation and artificial intelligence technologies for better Internet of Things framework to predict COVID

open access: yesIET Networks, EarlyView., 2022
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla   +2 more
wiley   +1 more source

On Provable White-Box Security in the Strong Incompressibility Model

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where
Estuardo Alpirez Bock   +2 more
doaj   +1 more source

Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage

open access: yesFuture Internet, 2018
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang   +3 more
doaj   +1 more source

Recent Advances on Thermochromic Inks for Security Applications

open access: yesAdvanced Materials Technologies, EarlyView.
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira   +5 more
wiley   +1 more source

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +2 more sources

New provable data transfer from provable data possession and deletion for secure cloud storage

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu   +3 more
doaj   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

The Role of Certifications in Improving Household Food Security Among Peruvian Farmers

open access: yesAgribusiness, EarlyView.
ABSTRACT Achieving global food security requires sustainable transformations in agri‐food systems. Voluntary Sustainability Standards (VSS) such as Organic and Fairtrade aim to internalize certain social and environmental costs while promoting more equitable value distribution, improved market access, and sustainable production practices.
Lisa‐Marie Schulte, Awudu Abdulai
wiley   +1 more source

Home - About - Disclaimer - Privacy