Results 231 to 240 of about 124,822 (278)
Some of the next articles are maybe not open access.
2001
A key problem of the symmetric cryptosystems that we have described so far is key distribution and key management. When Alice and Bob use such a system, they must exchange a secret key before they can secretly communicate. For the key-exchange, they need, for example, a secure channel or a courier.
openaire +1 more source
A key problem of the symmetric cryptosystems that we have described so far is key distribution and key management. When Alice and Bob use such a system, they must exchange a secret key before they can secretly communicate. For the key-exchange, they need, for example, a secure channel or a courier.
openaire +1 more source
Multipurpose Public-Key Encryption
2017We propose a new type of public-key schemes, that simultaneously satisfies selective opening (SO) security, key-dependent message (KDM) security and leakage-resilience. Our construction can be instantiated under the quadratic residuosity (QR) assumption or decisional composite residuosity (DCR) assumption.
Rui Zhang, Kai He
openaire +1 more source
2017
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs.
Houda Ferradi +2 more
openaire +1 more source
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs.
Houda Ferradi +2 more
openaire +1 more source
A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT
IEEE Internet of Things Journal, 2022Hu Xiong, Tianang Yao, Shui Yu
exaly
Public-key authenticated encryption with keyword search revisited: Security model and constructions
Information Sciences, 2020Baodong Qin, Qiong Huang, Ximeng Liu
exaly
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
IEEE Transactions on Industrial Informatics, 2018Mimi, De-biao He, Neeraj Kumar, Smieee
exaly

