Results 231 to 240 of about 46,684 (278)
Some of the next articles are maybe not open access.
Searchable Symmetric Encryption
ACM Computing Surveys, 2017Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Poh, Geong Sen +4 more
openaire +2 more sources
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs, 2009Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire +1 more source
Updatable Searchable Symmetric Encryption: Definitions and Constructions
Theoretical Computer Science, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiwen Wang +4 more
openaire +1 more source
Randomized symmetric block encryption
Proceedings of the First International Conference on Security of Internet of Things, 2012Most of the trivial symmetric block encryption algorithms give the same cipher text for a given set of plain text and key. This property can be used for performing linear and differential cryptanalysis. Using the concept of random data generation we designed a new scheme to give different cipher texts for a given set of plain text and key (when ...
B. Dinesh Reddy +2 more
openaire +1 more source
2002
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire +1 more source
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire +1 more source
Computationally Efficient Searchable Symmetric Encryption
2010Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Liesdonk, van, P.P. +4 more
openaire +3 more sources
Boolean symmetric searchable encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire +1 more source
Undecryptable symmetric encryption
2011 IEEE GCC Conference and Exhibition (GCC), 2011Cryptography is necessary where the confidentiality of information needs to be protected, but it often not sufficient. There are many cases where a persistent attacker can obtain the secret keys in use on a system, no matter how much the system tries to prevent this (e.g. cold-boot attacks, DRM circumvention).
openaire +1 more source
Dynamic searchable symmetric encryption
Proceedings of the 2012 ACM conference on Computer and communications security, 2012Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara +2 more
openaire +1 more source
2017
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers.
openaire +1 more source
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers.
openaire +1 more source

