Results 31 to 40 of about 615,663 (220)
Public-Key Encryption Schemes with Auxiliary Inputs [PDF]
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. ProceedingsWe construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as
A. Akavia +16 more
core +2 more sources
Related Randomness Attacks for Public Key Encryption [PDF]
. Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems.
Paterson, Kenneth G. +2 more
core +2 more sources
Certificate-based hybrid encryption scheme in the standard model
For construction a public cryptosystem that requiring fewer infrastructures than public key infrastructure(PKI),a certificate-based public-key encryption(CBE) scheme was proposed by Gentry.In CBE scheme,a certification was signed by a third part on an ...
KANG Li, TANG Xiao-hu, FAN Jia
doaj +2 more sources
Yao’s millionaires’ problem and public-key encryption without computational assumptions
We offer efficient and practical solutions of Yao’s millionaires’ problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical.
Grigoriev, D., Kish, L., Shpilrain, V.
core +2 more sources
Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf +6 more
wiley +1 more source
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała +3 more
doaj +1 more source
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes
Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes where public key sizes are of order of hundreds of ...
Gaborit, Philippe +2 more
core +3 more sources
Public key searchable encryption scheme based on blockchain
Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.
Ruizhong DU, Ailun TAN, Junfeng TIAN
doaj +2 more sources
Partially coherent optical chip enables physical-layer public-key encryption
Public-key encryption is essential for secure communications, eliminating the need for pre-shared keys. However, traditional schemes such as RSA (Rivest-Shamir-Adleman) and elliptic curve cryptography rely on computational complexity, making them ...
Bo Wu +5 more
doaj +1 more source

