Results 31 to 40 of about 6,586,318 (243)
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad +17 more
core +2 more sources
Faster Bootstrapping With Multiple Addends
As an important cryptographic primitive in cloud computing and outsourced computing, fully homomorphic encryption (FHE) is an animated area in modern cryptography.
Tanping Zhou +4 more
doaj +1 more source
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security.
Zhihao Wang, Ru Huo, Shuo Wang
doaj +1 more source
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh +3 more
doaj +1 more source
Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel +3 more
core +2 more sources
Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core +5 more sources
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba +11 more
wiley +1 more source
ABSTRACT Background Osteonecrosis (ON) is a debilitating complication of acute lymphoblastic leukemia (ALL) therapy. While numerous studies have explored its incidence and associated risk factors, investigations using large‐scale cohorts remain important to characterize ON across heterogeneous populations.
Noémie de Villiers +5 more
wiley +1 more source
On a new fast public key cryptosystem [PDF]
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core
ABSTRACT Background L‐asparaginase is a critical component in treatment protocols for pediatric acute lymphoblastic leukemia. Acute pancreatitis reactions can necessitate delays and, in some cases, discontinuation of L‐asparaginase, which compromises outcomes.
Edward J. Raack +39 more
wiley +1 more source

