Results 31 to 40 of about 956 (257)

Stronger Security Variants of GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2016
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj   +1 more source

MRCC: A Practical Covert Channel Over Monero With Provable Security

open access: yesIEEE Access, 2021
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo   +3 more
doaj   +1 more source

Translating Biomedical Research to Medical Devices: A Practical Guide and the Arteriovenous Graft Case Study

open access: yesAdvanced NanoBiomed Research, EarlyView.
Despite significant advances, most academic research fails to result in medical products that benefit patients. This guide shares five key steps to help researchers close that gap: set clear goals, test thoroughly, protect ideas, build diverse teams, and partner with industry.
Cristina Oldani   +4 more
wiley   +1 more source

Security model for ID-based key exchange

open access: yesTongxin xuebao, 2010
The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed.
LIU Wen-ju1   +4 more
doaj   +2 more sources

Provable Secure Generalized Signcryption [PDF]

open access: yesJournal of Computers, 2010
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire   +1 more source

Integrated Evaluation of Contaminant Profiles, Detection Techniques, and Management Strategies for Tannery Sludge

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT This review article critically examines the environmental and health hazards of tannery sludge (TS), a complex by‐product of the leather tanning industry. TS is characterized by a diverse array of contaminants, including heavy metals like chromium, organic pollutants such as polycyclic aromatic hydrocarbons (PAHs), volatile organic compounds ...
Yashar Aryanfar   +10 more
wiley   +1 more source

General MIM Secure Two-round Authentication Protocol Based on LPN [PDF]

open access: yesJisuanji gongcheng, 2019
The LPN-based authentication protocol is simple in structure,low in computation,and resistant to quantum attacks.It is suitable for lightweight devices such as radio frequency identification,but it cannot meet the requirements of low cost and strong ...
QING Zhejia
doaj   +1 more source

Security of COFB against Chosen Ciphertext Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj   +1 more source

Enhanced Rheological and Filtration Performance of Drilling Fluids Using Fe3O4/Saponin/Cu(II) Nanocomposites: Synthesis, Characterization, and Application

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Drilling fluids used in high‐performance well operations often struggle to maintain rheological stability, colloidal dispersion, and filtration control under harsh downhole conditions. This study engineered a multifunctional Fe3O4@Saponin/Cu(II) nanocomposite to address these challenges.
Kassem Al Attabi   +9 more
wiley   +1 more source

EPN:encryption padding for NTRU with provable security

open access: yesTongxin xuebao, 2008
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj   +2 more sources

Home - About - Disclaimer - Privacy