Results 241 to 250 of about 46,684 (278)
Some of the next articles are maybe not open access.

Universally Composable Symmetric Encryption

2009 22nd IEEE Computer Security Foundations Symposium, 2009
For most basic cryptographic tasks, such as public-key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities have been formulated in the simulation-based security approach, along with their realizations.
Ralf Küsters, Max Tuengerthal
openaire   +1 more source

Symmetric Encryption

2012
Abstract This chapter concerns symmetric encryption and introduces core concepts and algorithms. It explains the difference between stream and block ciphers and demonstrates how their different properties result in different uses. Two important block ciphers are considered in some detail.
openaire   +1 more source

Optimal Symmetric Ternary Quantum Encryption Schemes

International Journal of Theoretical Physics, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Yu-qi   +3 more
openaire   +1 more source

Index based symmetric block encryption

2011 2nd National Conference on Emerging Trends and Applications in Computer Science, 2011
Based on the principle of symmetric key encryption we present a new method of symmetric block encryption using indices called Index-Based Symmetric Block Encryption. Instead of going through a number of tedious rounds while encrypting the data, the data can be encrypted in just two rounds.
K. Sashank   +2 more
openaire   +1 more source

Forward secure searchable symmetric encryption

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017
Data outsourcing to third party clouds poses numerous data security threats. Access by unauthorized users is one of the security threat to the outsourced data. Unauthorized access can be avoided by encrypting the data before outsourcing. However, encrypting data before outsourcing renders it unsearchable to the data owner. Searchable encryption schemes
Muhammad Saqib Niaz, Gunter Saake
openaire   +1 more source

Attribute-Based Symmetric Searchable Encryption

2020
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows users to either decrypt the whole ciphertext or nothing at all.
Dang, Hai-Van   +3 more
openaire   +1 more source

Symmetric-Key Homomorphic Encryption for Encrypted Data Processing

2009 IEEE International Conference on Communications, 2009
The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy would always imply a sacrifice of functionality. Many applications, such as ASP, requiring a significant amount of processing at the data storage servers are hence precluded from ...
openaire   +1 more source

Toward Practical Searchable Symmetric Encryption

2013
Searchable symmetric encryption is a good building block toward ensuring privacy preserving keyword searches in a cloud computing environment. This area has recently attracted a great deal of attention and a large quantity of research has been conducted.
Wakaha Ogata   +3 more
openaire   +1 more source

Symmetric Encryption

2009
Michael Coles, Rodney Landrum
openaire   +2 more sources

Symmetric Encryption Algorithms

2022
Stefania Loredana Nita   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy