Results 91 to 100 of about 90,649 (207)

Unbiased risk estimation method for covariance estimation [PDF]

open access: yes, 2011
We consider a model selection estimator of the covariance of a random process. Using the Unbiased Risk Estimation (URE) method, we build an estimator of the risk which allows to select an estimator in a collection of model.
Chabriac, Claudie   +2 more
core   +2 more sources

Provably secure private key protection scheme for smart mobile terminal

open access: yesTongxin xuebao, 2012
A provable security scheme for private key protection of smart mobile terminal (SMT) was presented.In the scheme a improved security mechanism is incorporated,which includes password protection,key division and partial key retrieval from server of strong
Jun MA, Jian-feng MA, Yuan-bo GUO
doaj   +2 more sources

On the security of the Courtois-Finiasz-Sendrier signature

open access: yesOpen Mathematics, 2018
We prove that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the ...
Morozov Kirill   +3 more
doaj   +1 more source

Tighter Proofs of CCA Security in the Quantum Random Oracle Model

open access: yes, 2019
We revisit the construction of IND-CCA secure key encapsulation mechanisms (KEM) from public-key encryption schemes (PKE). We give new, tighter security reductions for several constructions. Our main result is an improved reduction for the security of the (formula presented)-transform of Hofheinz, Hövelmanns, and Kiltz (TCC’17) which turns OW-CPA ...
Bindel, Nina   +4 more
openaire   +2 more sources

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

Faster Convex Optimization: Simulated Annealing with an Efficient Universal Barrier

open access: yes, 2015
This paper explores a surprising equivalence between two seemingly-distinct convex optimization methods. We show that simulated annealing, a well-studied random walk algorithms, is directly equivalent, in a certain sense, to the central path interior ...
Abernethy, Jacob, Hazan, Elad
core  

A Secure Authentication Protocol Supporting Efficient Handover for UAV

open access: yesMathematics
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen   +5 more
doaj   +1 more source

Towards automated proofs for asymmetric encryption schemes in the random oracle model [PDF]

open access: green, 2008
Judicaël Courant   +4 more
openalex   +1 more source

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

open access: yes, 2020
We propose \(\mathsf {FO_\mathsf {AKE}}\), a generic construction of two-message authenticated key exchange (AKE) from any passively secure public key encryption (PKE) in the quantum random oracle model (QROM). Whereas previous AKE constructions relied on a Diffie-Hellman key exchange or required the underlying PKE scheme to be perfectly correct, our ...
Hövelmanns, Kathrin   +3 more
openaire   +2 more sources

Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model [PDF]

open access: yes, 2002
The generic group model has recently been used to prove the security of certain asymmetric encryption and signature schemes. This paper presents results that show that there exist problems in that are provably hard in the generic group model but easy to solve whenever the random encoding function is replaced with a specific encoding function (or one ...
openaire   +1 more source

Home - About - Disclaimer - Privacy