搜索结果: 1-14 共查到“军事学 confidentiality”相关记录14条 . 查询时间(0.062 秒)
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Zero-knowledge Proofs Confidential Transactions Zcoin
2019/4/15
We propose Lelantus, a new anonymous payment system which ensures both transaction confidentiality and anonymity with small proof sizes, short verification times and without requiring a trusted setup.
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
OCB2 Authenticated Encryption Cryptanalysis
2019/3/21
We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably-secure authenticated encryption services, and sin...
libInterMAC: Beyond Confidentiality and Integrity in Practice
fragmentation attack SSH Authenticated Encryption
2019/2/25
Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS ...
The 3rd Generation Partnership Project (3GPP) recently proposed a standard for 5G telecommunications, containing an identity protection scheme meant to address the long-outstanding privacy problem of ...
OCB2 is a widely standardized mode of operation of a blockcipher that aims at providing authenticated encryption. A recent report by Inoue and Minematsu (IACR EPRINT report 2018/1040) indicates that O...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
A QKD-based digital archiving solution providing everlasting confidentiality and integrity
QKD secret sharing commitments
2016/12/12
With increasing digitization, the amount of archived data that requires long-term protection of confidentiality and integrity increases rapidly. Examples include electronic health records, genome data...
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Collaborative filtering Outsourcing Integrity
2016/2/24
In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers...
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
network homomorphic WSN Wireless Sensor Network
2015/12/22
Wireless Sensor Networks (WSN) has become more
and more important in many applications especially those required
a high level of security such as: commercial, military
and telemedicine applications...
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Data confidentiality multi-tenancy audit-trail log
2015/12/18
Cloud computing is delivery of services rather
than a product and among different cloud deployment models,
the public cloud provides improved scalability and cost reduction
when compared to others....
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
attribute-based encryption encrypted search
2011/1/18
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to intereste...
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
attribute-based encryption encrypted search
2012/3/30
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to intereste...
Grey-Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
design confidentiality BDDs
2009/3/27
In 1997, Patarin and Goubin introduce new asymmetric
cryptosystems based on the diÆculty of recovering two systems of mul-
tivariate polynomials from their composition. We make a dierent use
...
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Modes of operation PRP-RKA KASUMI security proofs
2009/3/20
This paper analyses the 3GPP confidentiality and integrity schemes adopted by Universal
Mobile Telecommunication System, an emerging standard for third generation wireless communications.The schemes,...