Results 21 to 30 of about 48,518 (327)

Symmetric Public-Key Encryption [PDF]

open access: yes, 2007
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of public keys; we give cryptographic protocols for the following tasks: 1.
Galil, Zvi, Landau, Gad M., Yung, Moti
openaire   +2 more sources

Rethinking Searchable Symmetric Encryption

open access: yes2023 IEEE Symposium on Security and Privacy (SP), 2023
ISBN:978-1-6654-9336 ...
Zichen Gui   +2 more
openaire   +2 more sources

A Symmetric Encryption Method for Transmitting IEC 62351 Communicaiton Keys in Substations

open access: yesZhongguo dianli, 2019
With the improvement of the information level of the substation, the cyber security problem of information communication has become increasingly prominent.
Fang FANG   +3 more
doaj   +1 more source

The Locality of Searchable Symmetric Encryption [PDF]

open access: yes, 2014
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme ...
David Cash, Stefano Tessaro
openaire   +2 more sources

On the Security of Symmetric Encryption Against Mass Surveillance

open access: yesIEEE Access, 2020
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability ...
Da-Zhi Sun, Yi Mu
doaj   +1 more source

An Efficient Solution Towards Secure Homomorphic Symmetric Encryption Algorithms [PDF]

open access: yesITM Web of Conferences, 2019
In this paper, we consider Homomorphic Encryption (HE) to process over encrypted data in order to achieve user privacy. We present a framework solution to provide a high level of security for the symmetric HE algorithms.
Hariss Khalil   +3 more
doaj   +1 more source

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard

open access: yesApplied Sciences, 2018
With the increasing use of multimedia in communications, the content security of remote-sensing images attracts much attention in both the academia and industry. The Advanced Encryption Standard (AES) is a famous symmetric cryptosystem.
Xiaoqiang Zhang, Xuesong Wang
doaj   +1 more source

A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing

open access: yesIEEE Access, 2021
With high flexibility and accessibility of data outsourcing environment such as cloud computing environment, several healthcare providers implement electronic personal health records (PHRs) to enable individual patients to manage their own health data in
Somchart Fugkeaw
doaj   +1 more source

STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

open access: yesScientific Journal of Astana IT University, 2022
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy