Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Joseph Tonien"'
Publikováno v:
Symmetry, Vol 10, Iss 4, p 95 (2018)
Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recov
Externí odkaz:
https://doaj.org/article/038aedc22bb042a298185fc002bbc296
Publikováno v:
IEEE Transactions on Services Computing. 15:1664-1677
Message-Locked Encryption (MLE) is a useful tool to enable deduplication over encrypted data in cloud storage. It can significantly improve the cloud service quality by eliminating redundancy to save storage resources, and hence user cost, and also p
Autor:
Joseph Tonien, Willy Susilo
Publikováno v:
Theoretical Computer Science. 885:125-130
This paper investigates a novel RSA-like cryptosystem proposed by Murru-Saettone. This cryptosystem is constructed from a cubic field connected to the cubic Pell equation and Redei rational functions. The scheme is claimed to be secure against the Wi
Publikováno v:
Theoretical Computer Science. 960:113898
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 32:561-574
As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schem
Publikováno v:
Bulletin of the Australian Mathematical Society. 103:11-21
For a positive real number $t$, define the harmonic continued fraction $$\begin{eqnarray}\text{HCF}(t)=\biggl[\frac{t}{1},\frac{t}{2},\frac{t}{3},\ldots \biggr].\end{eqnarray}$$ We prove that $$\begin{eqnarray}\text{HCF}(t)=\frac{1}{1-2t(\frac{1}{t+2
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79e786f45e2725850f8210ae53fb4e15
https://doi.org/10.1007/978-3-031-17433-9_23
https://doi.org/10.1007/978-3-031-17433-9_23
Publikováno v:
Journal of Information and Optimization Sciences. 40:905-917
Web applications are becoming more and more prominent in our daily lives. A challenge that follows is protecting these applications from unauthorised users. This paper introduces a scheme for generating and verifying authentication codes, where these
Publikováno v:
The Ramanujan Journal. 49:669-697
In this paper, we study the harmonic continued fractions. These form an infinite family of ordinary continued fractions with coefficients $$\frac{t}{1}, \frac{t}{2}, \frac{t}{3}, \ldots $$ for all $$t>0$$ . We derive explicit formulas for the numerat
Publikováno v:
Information Security Conference (ISC 2021)
Information Security Conference (ISC 2021), Nov 2021, Bali, Indonesia
Lecture Notes in Computer Science ISBN: 9783030913557
Information Security Conference (ISC 2021), Nov 2021, Bali, Indonesia
Lecture Notes in Computer Science ISBN: 9783030913557
International audience; We consider four variants of the RSA cryptosystem with an RSA modulus N = pq where the public exponent e and the private exponent d satisfy an equation of the form ed − k (p^2 − 1)( q^2 − 1 )= 1. We show that, if the pri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2cb7dbd9272730690c49e333bc5a9011
https://hal.archives-ouvertes.fr/hal-03437901
https://hal.archives-ouvertes.fr/hal-03437901