Results 31 to 40 of about 6,586,318 (243)

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

Faster Bootstrapping With Multiple Addends

open access: yesIEEE Access, 2018
As an important cryptographic primitive in cloud computing and outsourced computing, fully homomorphic encryption (FHE) is an animated area in modern cryptography.
Tanping Zhou   +4 more
doaj   +1 more source

A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid

open access: yesFuture Internet, 2022
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security.
Zhihao Wang, Ru Huo, Shuo Wang
doaj   +1 more source

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +1 more source

Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]

open access: yes, 2016
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel   +3 more
core   +2 more sources

Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]

open access: yes, 2011
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core   +5 more sources

Cognitive Functioning in Vorinostat‐Treated Pediatric and Young Adult Patients Over the First 180 Days After Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba   +11 more
wiley   +1 more source

Incidence and Risk Factors of Serious Osteonecrosis in Pediatric Acute Lymphoblastic Leukemia: A CYP‐C Population‐Based Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Osteonecrosis (ON) is a debilitating complication of acute lymphoblastic leukemia (ALL) therapy. While numerous studies have explored its incidence and associated risk factors, investigations using large‐scale cohorts remain important to characterize ON across heterogeneous populations.
Noémie de Villiers   +5 more
wiley   +1 more source

On a new fast public key cryptosystem [PDF]

open access: yes, 2015
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core  

Novel Genetic Risk Factor Identified for L‐Asparaginase‐Induced Pancreatitis in Pediatric Patients With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background L‐asparaginase is a critical component in treatment protocols for pediatric acute lymphoblastic leukemia. Acute pancreatitis reactions can necessitate delays and, in some cases, discontinuation of L‐asparaginase, which compromises outcomes.
Edward J. Raack   +39 more
wiley   +1 more source

Home - About - Disclaimer - Privacy