56,545 Hits in 3.5 sec

Logical relations for encryption

E. Sumii, B.C. Pierce
Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.  
The theory of relational parametricity and its logical relations proof technique are powerful tools for reasoning about information hiding in the polymorphic λ-calculus.  ...  , and key generationand introducing syntactic logical relations (in the style of Pitts and Birkedal-Harper) for this calculus that can be used to prove behavioral equivalences between programs that use  ...  Acknowledgements We would like to thank Martín Abadi, Naoki Kobayashi, the members of Akinori Yonezawa's group in the University of Tokyo, the members of the Logic and Computation Seminar-especially Andre  ... 
doi:10.1109/csfw.2001.930151 dblp:conf/csfw/SumiiP01 fatcat:dqmxolyky5hzdm5d5j2kz77ysm

Toward Efficient Evaluation of Logic Encryption Schemes: Models and Metrics [article]

Yinghua Hu and Vivek V. Menon and Andrew Schmidt and Joshua Monson and Matthew French and Pierluigi Nuzzo
2020 arXiv   pre-print
Research in logic encryption over the last decade has resulted in various techniques to prevent different security threats such as Trojan insertion, intellectual property leakage, and reverse engineering  ...  This paper addresses the above challenges by relying on a general logic encryption model that can encompass all the existing techniques, and a uniform set of metrics that can capture multiple, possibly  ...  We rely on a general functional model for logic encryption that can encompass all the existing methods.  ... 
arXiv:1909.07917v2 fatcat:icndytnl7bgn3p2rqyz7lbbira

Pseudonymization for improving the Privacy in E-Health Applications

Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
Our approach may be used as a basis for implementing secure EHR architectures or as an extension to existing systems.  ...  As highly sensitive patient information provides a promising goal for attackers and is also demanded by insurance companies and employers, there is an increasing social and political pressure regarding  ...  support, further Stefan Jakoubi for his review.  ... 
doi:10.1109/hicss.2008.366 dblp:conf/hicss/RiedlGFN08 fatcat:rgd3idh2ibc5xpkqafayrlfgze

Evaluating the security of logic encryption algorithms

Pramod Subramanyan, Sayak Ray, Sharad Malik
2015 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
We conduct a thorough evaluation of our attack by examining six proposals for logic encryption from the literature. We find that all of these are vulnerable to our attack.  ...  One class of techniques to combat these threats is logic encryption.  ...  Related Work 1) Logic Encryption: This paper considered only combinational logic encryption schemes.  ... 
doi:10.1109/hst.2015.7140252 dblp:conf/host/SubramanyanRM15 fatcat:guionpgceneazdccrugtuvewvm

Generalized Majority Logic Criterion to Analyze the Statistical Strength of S-Boxes

Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal, Hasan Mahmood
2012 Zeitschrift fur Naturforschung A-A Journal of Physical Sciences  
The majority logic criterion is applicable in the evaluation process of substitution boxes used in the advanced encryption standard (AES).  ...  In this paper, we use the majority logic criteria to analyze some popular and prevailing substitution boxes used in encryption processes.  ...  In this section, we present issues related to the presented problem of selecting optimal S-box for image encryption applications.  ... 
doi:10.5560/zna.2012-0022 fatcat:gvepbocf7jbqvahmll522sh75u

Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment

Quazi Warisha Ahmed
2021 Turkish Journal of Computer and Mathematics Education  
The proposed approach of Novel Hybrid Encryption Mode concentrates more on access control logics and the crypto norms with respect to privacy measures.  ...  This paper introduces a new crypto-approach called Novel Hybrid Encryption Mode (NHEM), in which this algorithm integrates several latest approaches of crypto logics into it and provides a top-end security  ...  The proposed approach of AES-512 bits encryption logic is utilized for data encryption and decryption process and the MD5 logics are used for access control logics as well as the credential generation  ... 
doi:10.17762/turcomat.v12i6.1289 fatcat:idsnug5vifdlpcgeksfu72ul7e

Classification of Data Based on a Fuzzy Logic System

Masoud Mohammadian
2008 2008 International Conference on Computational Intelligence for Modelling Control & Automation  
Implementing and applying policies related to data security and privacy therefore has become one of the core and important activities for large organizations.  ...  This paper explores the use of fuzzy logic in classification of data and suggests a method that can determine requirements for data security and privacy in an organization based on organizations needs  ...  Acknowledgement -Author wish to acknowledge the assistant and support provided to him during is visit to the Department of Electrical and Computer Engineering at the University of Toronto for this project  ... 
doi:10.1109/cimca.2008.232 dblp:conf/cimca/Mohammadian08 fatcat:2525tdoz2vcnton2gyc5o4zrga

An Enhanced Logic Encryption Method with a Fully Correlated Key Interdependency Block

Jiaji He, Haocheng Ma, Kaiyue Song, Yiqiang Zhao
2019 Electronics  
However, the majority of existing logic encryption methods emphasize one criterion over the other.  ...  Logic encryption, as a hardware security technique, can protect integrated circuits (ICs) by inserting additional gates.  ...  Logic encryption inserts key-gates into the nodes related to sensitive information to encrypt the ICs, which can be decrypted by applying the correct key sequence [10] .  ... 
doi:10.3390/electronics8121392 fatcat:pib7eyte7je6lpjwixjky2i2km

Secure k-NN query on encrypted cloud data with multiple keys

Bulusu Rama, MLR Institute Of Technology, Hyderabad, India
2019 International Journal of Advanced Trends in Computer Science and Engineering  
The K-nearest neighbors (k-NN) query is a core relating for occupying space and being using many channel for communication in the database.  ...  This way of transfer of facts seems to be impracticable where many clients are not truthful nor significant in using the key, in this issue we prefer paperback logic for it, data owner and query user has  ...  Annular Scale Seek On Encrypted Relating Records Searchable encryption is one of the most important and frequently used search effect, which will give the convince for the client to search a particular  ... 
doi:10.30534/ijatcse/2019/82832019 fatcat:lipq62pxund4fot2xo7uacrzya

Information Flow Under Budget Constraints [chapter]

Pavel Naumov, Jia Tao
2016 Lecture Notes in Computer Science  
For each informational model I = S, {D a } a∈S , · , L and each formula ϕ ∈ Φ(S), the satisfiability relation I ϕ is defined as follows:  ...  The proposed logical system captures general principles of dependencies between pieces of information constrained by a given budget. Definition 6.  ...  Related Literature The axiomatic system proposed in this paper is related to other logical systems for reasoning about bounded resources.  ... 
doi:10.1007/978-3-319-48758-8_23 fatcat:gc4z6jy4abc5rkthryavl2lfk4

Enhancing Security Levels at ISP Server Using Multiple Security Techniques with Proposed Crypo Application

Suraj U. Rasal, Varsha S. Rasal, Shraddha T. Shelar
2019 International Journal of Engineering and Technology Innovation  
While delivering encrypted data, applied logic name is also delivered so that end users can decrypt data using the same logic.  ...  According to proposed logic, the final encrypted binary formatted data are further applied with Advanced Encryption Standard (AES) to deliver it to the ISP.  ...  Cipher policy with the proposed logical approach is further applied for data encryption.  ... 
doaj:7ef8484d26c44f86b6bdcf0275fd84ec fatcat:4keghnyv3jdezk2pat4byuo3oa

Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme

Hinal M. Mudia, Pallavi V. Chavan
2016 Procedia Computer Science  
Here we had tried to implement the proposed technique fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme.  ...  For image encryption AES algorithm is used for encryption and decryption. The implementation of encryption algorithms can be very complex when we are focusing on rule based share generation.  ...  Related Work M. Zeghid, M. Machhout, L. Khriji. A. Baganne, and R. Tourki 1 have proposed the Advanced Encryption Standard (AES) algorithm used for encryption technique.  ... 
doi:10.1016/j.procs.2016.02.110 fatcat:yljq76mjqrglnktbjqognj5sme

Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware

Anirban Sengupta, Mahendra Rathor
2019 IEEE Access  
This paper presents a novel security mechanism for protecting functionally obfuscated DSP core against removal attack using low-cost, low-power key encryption hardware.  ...  However, functional obfuscation methodologies for DSP cores use security logics that are not lightweight and are prone to removal attack by an adversary.  ...  FIGURE 2 . 2 Block diagram of key encryption logic for reconfiguring ILB structure. FIGURE 3 . 3 Design architecture of custom hardware of SHA-512 based key encryption logic.  ... 
doi:10.1109/access.2018.2889224 fatcat:a32wc32qgzgybadiuhi73oycs4

Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

Vidya Ch, N. Chandra Sekhar Reddy, G. Praveen Babu
2014 International Journal of Computer Applications  
Previous cloud development provides the security in limited dimensions with the help of application logic. It not sufficient for control the all different attackers.  ...  Those dimensions are application logic view and regulatory framework. Its have excellent security properties. This approach provides the excellent security compare to previous approaches.  ...  First perspective is effective application logic preparation. Second perspective is homomorphic encryption techniques implementation. This is related multiparty verification compilation approach.  ... 
doi:10.5120/16760-6315 fatcat:fveyqsxuz5ffnibzels5kbhw6e

A general framework for the composition of quantum homomorphic encryption & quantum error correction [article]

Yingkai Ouyang, Peter P. Rohde
2022 arXiv   pre-print
We apply our framework to both discrete- and continuous-variable models for quantum computation, such as Pauli-key and permutation-key encryptions in the qubit model, and displacement-key encryptions in  ...  Two essential primitives for universal, cloud-based quantum computation with security based on the laws of quantum mechanics, are quantum homomorphic encryption with information-theoretic security and  ...  ACKNOWLEDGEMENTS We thank Rui Chao for discussions, and thank Yanglin Hu and Marco Tomamichel for their feedback. Peter Rohde is funded by an ARC Future Fellowship (project FT160100397).  ... 
arXiv:2204.10471v1 fatcat:2323r5trlfg4lmcvgcfan36kda
« Previous Showing results 1 — 15 out of 56,545 results