Zobrazeno 1 - 10
of 28
pro vyhledávání: '"homophonic encoding"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 277-313 (2018)
Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable
Externí odkaz:
https://doaj.org/article/4ceb50061e52427594dec0f338619602
Autor:
Lacharité, M.-S, Paterson, K.
Publikováno v:
IACR Transactions on Symmetric Cryptology 2018(1) 277-313
IACR Transactions on Symmetric Cryptology, Pp 277-313 (2018)
IACR Transactions on Symmetric Cryptology; Volume 2018, Issue 1; 277-313
IACR Transactions on Symmetric Cryptology, Pp 277-313 (2018)
IACR Transactions on Symmetric Cryptology; Volume 2018, Issue 1; 277-313
Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable
Autor:
Milosavljević, Milan1 (AUTHOR) milan.milosavljevic@vlatacom.com, Radomirović, Jelica1,2 (AUTHOR) jelica.radomirovic@vlatacom.com, Unkašević, Tomislav1 (AUTHOR) bosko@vlatacom.com, Božilović, Boško1 (AUTHOR)
Publikováno v:
Mathematics (2227-7390). Dec2024, Vol. 12 Issue 23, p3724. 24p.
Autor:
Mihaljević, Miodrag J.1,2 miodragm@mi.sanu.ac.rs, Imai, Hideki2,3
Publikováno v:
Computing. Aug2009, Vol. 85 Issue 1/2, p153-168. 16p. 1 Diagram, 1 Chart.
Publikováno v:
Cybersecurity (2523-3246); 8/1/2024, Vol. 7 Issue 1, p1-15, 15p
Publikováno v:
1986 IEEE Symposium on Security & Privacy; 1986, p148-148, 1p
Autor:
Penzhorn, W.T., Els, W.C.
Publikováno v:
Proceedings of COMSIG '94 - 1994 South African Symposium on Communications & Signal Processing; 1994, p52-59, 8p
Autor:
Ryabko, Boris, Fionov, Andrei
Publikováno v:
IEEE Transactions on Information Theory; Sep99, Vol. 45 Issue 6, p2083, 9p
Autor:
Hideki Imai, Miodrag J. Mihaljevic
Publikováno v:
Computing. 85:153-168
This paper proposes and analyzes an approach for design of stream ciphers based on joint computing over random and secret data. Feasibility of encryption/ decryption computation when the ciphertext involve pure random data is shown. The core element
Autor:
Hiroshi Imai, Miodrag J. Mihaljevic
Publikováno v:
2008 International Symposium on Information Theory and Its Applications.
A novel approach for design of stream ciphers based on a combination of pseudo-randomness and randomness is proposed. The core element of the approach is a pseudo-random embedding of the random bits into the ciphertext. This embedding plays a role of