Zobrazeno 1 - 10
of 526
pro vyhledávání: '"Cramer–Shoup cryptosystem"'
Publikováno v:
Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021
18th International Conference on Security and Cryptography, SECRYPT 2021
18th International Conference on Security and Cryptography, SECRYPT 2021, Jul 2021, Online, France. ⟨10.5220/0010580607660771⟩
SECRYPT
18th International Conference on Security and Cryptography, SECRYPT 2021
18th International Conference on Security and Cryptography, SECRYPT 2021, Jul 2021, Online, France. ⟨10.5220/0010580607660771⟩
SECRYPT
International audience; Cramer-Shoup was the first practical adaptive CCA-secure public key encryption scheme. We propose a faster version of this encryption scheme, called Fast Cramer-Shoup. We show empirically and theoretically that our scheme is f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03df3d3655ccc409e672a9a3f378ee27
https://hal.science/hal-03419423/document
https://hal.science/hal-03419423/document
Publikováno v:
Intelligent Data Communication Technologies and Internet of Things ISBN: 9783030340797
Cloud Service Providers (CSP) offers several services over the internet to the cloud users. One of the predominant services offered to the cloud users is data storage. With the rapid growth of digital data, redundancy has become the bottleneck issue
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a9d6ce4e3fe851eca73ed425888d1e9
https://doi.org/10.1007/978-3-030-34080-3_80
https://doi.org/10.1007/978-3-030-34080-3_80
Autor:
R. Anitha, Y. Mohamed Sirajudeen
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811319501
Cloud computing allows users to store data in a distributed cloud storage. So the data are stored in different geographical locations which will predominantly increase the vulnerability of the data. The natural way to safeguard the data from the intr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d6cd17e7bbf29bb06dfc3e415793bf24
https://doi.org/10.1007/978-981-13-1951-8_25
https://doi.org/10.1007/978-981-13-1951-8_25
Publikováno v:
Information Security and Cryptology ISBN: 9783319547046
Inscrypt
Inscrypt
Related-key attacks allow an adversary to change the key stored in the memory of a physical device via tampering or other means, and subsequently observe the outcomes of the cryptosystem under these modified keys. Cramer and Shoup (CRYPTO 1998) propo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bca1e66acf7413b4684f687163e466d6
https://doi.org/10.1007/978-3-319-54705-3_10
https://doi.org/10.1007/978-3-319-54705-3_10
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2014 International Conference on Contemporary Computing and Informatics (IC3I).
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over t
Autor:
Rui Xue, Jinyong Chang
Publikováno v:
SECRYPT
An encryption scheme is key-dependent message chosen plaintext attack (KDM-CPA) secure means that it is secure even if an adversary obtains encryptions of messages that depend on the secret key. However, there are not many schemes that are KDM-CPA se
Publikováno v:
Information Security and Privacy ISBN: 9783642390586
ACISP
ACISP
The Key-Dependent Message (KDM) security requires that an encryption scheme remains secure, even if an adversary has access to encryptions of messages that depend on the secret key. In a multi-user surrounding, a key-dependent message can be any poly
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::526ea8bad5dffaab95022385ea9e714b
https://doi.org/10.1007/978-3-642-39059-3_10
https://doi.org/10.1007/978-3-642-39059-3_10