Results 31 to 40 of about 615,663 (220)

Public-Key Encryption Schemes with Auxiliary Inputs [PDF]

open access: yes, 2010
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. ProceedingsWe construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as
A. Akavia   +16 more
core   +2 more sources

Related Randomness Attacks for Public Key Encryption [PDF]

open access: yes, 2014
. Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems.
Paterson, Kenneth G.   +2 more
core   +2 more sources

Certificate-based hybrid encryption scheme in the standard model

open access: yesTongxin xuebao, 2009
For construction a public cryptosystem that requiring fewer infrastructures than public key infrastructure(PKI),a certificate-based public-key encryption(CBE) scheme was proposed by Gentry.In CBE scheme,a certification was signed by a third part on an ...
KANG Li, TANG Xiao-hu, FAN Jia
doaj   +2 more sources

Yao’s millionaires’ problem and public-key encryption without computational assumptions

open access: yes, 2017
We offer efficient and practical solutions of Yao’s millionaires’ problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical.
Grigoriev, D., Kish, L., Shpilrain, V.
core   +2 more sources

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała   +3 more
doaj   +1 more source

Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes

open access: yes, 2017
Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes where public key sizes are of order of hundreds of ...
Gaborit, Philippe   +2 more
core   +3 more sources

Public key searchable encryption scheme based on blockchain

open access: yesTongxin xuebao, 2020
Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.
Ruizhong DU, Ailun TAN, Junfeng TIAN
doaj   +2 more sources

Partially coherent optical chip enables physical-layer public-key encryption

open access: yesOpto-Electronic Advances
Public-key encryption is essential for secure communications, eliminating the need for pre-shared keys. However, traditional schemes such as RSA (Rivest-Shamir-Adleman) and elliptic curve cryptography rely on computational complexity, making them ...
Bo Wu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy