Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Diana Maimut"'
Autor:
Diana Maimuţ, George Teşeleanu
Publikováno v:
Cryptography, Vol 7, Iss 2, p 31 (2023)
Inspired by the advancements in (fully) homomorphic encryption in recent decades and its practical applications, we conducted a preliminary study on the underlying mathematical structure of the corresponding schemes. Hence, this paper focuses on inve
Externí odkaz:
https://doaj.org/article/5b158318b51c4c79b4e603fa446ce53a
Autor:
Diana Maimuţ, Alexandru Cristian Matei
Publikováno v:
Mathematics, Vol 10, Iss 19, p 3676 (2022)
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice. The rather recent developments of emergent technologies, such as blockch
Externí odkaz:
https://doaj.org/article/8c32c9ab8472487786383eba5a9ce433
Autor:
George Teseleanu, Diana Maimut
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783031175091
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2bd97561852537dcafba221fbcde0737
https://doi.org/10.1007/978-3-031-17510-7_18
https://doi.org/10.1007/978-3-031-17510-7_18
Publikováno v:
APCC
Following the idea that the memory-hard hash function Argon2 can be modified to support other compression functions, we propose the use of Blake 3 and a tweaked version of it as the core function. More precisely, we are particularly interested in Arg
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Rom
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full pa
Autor:
Diana Maimut, Raja Naeem Akram
Publikováno v:
Springer, 2017, 978-3-319-69283-8. ⟨10.1007/978-3-319-69284-5⟩
Lecture Notes in Computer Science ISBN: 9783319692838
Lecture Notes in Computer Science ISBN: 9783319692838
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::96932f4c9742d41dd2ae4938acb408e9
https://ens.hal.science/hal-01671056
https://ens.hal.science/hal-01671056
Autor:
K. Ouafi, Diana Maimut
Publikováno v:
IEEE Security & Privacy Magazine. 10:76-79
At first glance, combining the terms "cryptography" and "lightweight" might invite you to think about a lack of security. However, here the combination refers to suitable cryptography for limited devices for which trade offs between performance, secu
Autor:
Reza Reyhanitabar, Diana Maimut
Publikováno v:
IEEE Security & Privacy. 12:70-72
Wondering whether researchers have a cryptographic tool able to provide both confidentiality (privacy) and integrity (authenticity) of a message? They do: authenticated encryption (AE), a symmetric-key mechanism that transforms a message into a ciphe
Publikováno v:
2012 9th International Conference on Communications (COMM).
The main goal of this paper is to inform the reader about new directions in cloud computing, referring to performance, availability and, especially, security. We describe modern capabilities that any cloud provider should support, together with a cry