Results 71 to 80 of about 615,663 (220)

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks

open access: yesIEEE Access, 2017
The emergence of 5G networks will allow cloud computing providers to offer more convenient services. However, security and privacy issues of cloud services in 5G networks represent huge challenges.
Yan Xu   +5 more
semanticscholar   +1 more source

Public Key Infrastructure based on Authentication of Media Attestments [PDF]

open access: yes, 2013
Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key ...
Heinrich, Stuart
core  

Server-Aided Public Key Encryption With Keyword Search

open access: yesIEEE Transactions on Information Forensics and Security, 2016
Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is ...
Rongmao Chen   +6 more
semanticscholar   +1 more source

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]

open access: yes, 2012
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie   +4 more
core  

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2001
We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen ciphertext attack. One scheme is based on Paillier's Decision Composite Residuosity assumption, while another is based in the ...
R. Cramer, V. Shoup
semanticscholar   +1 more source

Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn

open access: yesCryptography, 2018
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn as mathematical platform. In 2012, an improvement of the cryptosystem’s memory requirements was suggested by Othman. The proposal by Doliskani et al.
María Isabel González Vasco   +2 more
doaj   +1 more source

Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

open access: yesE3S Web of Conferences, 2018
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography.
Aryanti Aryanti, Mekongga Ikhthison
doaj   +1 more source

Home - About - Disclaimer - Privacy