A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Modifying an Enciphering Scheme After Deployment
[chapter]
2017
Lecture Notes in Computer Science
Frequent real-world examples are migrating from a token-based encryption system for credit-card numbers to a format-preserving encryption (FPE) scheme, or extending the message space of an already deployed ...
Assume that a symmetric encryption scheme has been deployed and used with a secret key. ...
The approach we explore, of modifying a scheme after deployment, has several limitations. ...
doi:10.1007/978-3-319-56614-6_17
fatcat:akvjku2itnhtrdglfi2jnltuea
An efficient public key cryptosystem based on dihedral group and quantum spin states
2020
IEEE Access
The enciphering schemes based on medium transformations by following the strict guidelines are almost used everywhere. ...
We simulate the pixels of an image with the dihedral group and spin states for a defined phase to create confusion in it. ...
Fig. 6 demonstrate the consistency in enciphered contents which classifies the factual assaults hard, and the plain contents have sharp drops after sharp upsurges.
C. ...
doi:10.1109/access.2020.2987097
fatcat:5f24yto4yzerdh5pfafucmxtiy
Implementation Kalyna Algorithm in Microcontroller
2021
Advances in Cyber-Physical Systems
The information security is playing an increasingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems. ...
As an 8-bit platform, consider the family of AVR microcontrollers from Microchip (Atmel). ...
It was developed owing to the cooperation of Ukrainian scientists and the State Special Communications Service after the national competition in the field of cryptography. ...
doi:10.23939/acps2021.01.008
fatcat:hednkmnlsnb73jokcxr7m3qh44
ID Based Cryptography for Cloud Data Storage
2013
2013 IEEE Sixth International Conference on Cloud Computing
It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. ...
After the specification of the groups, the PKG defines a set of hash functions in accordance to the ID-based encryption and signature schemes in use [6] . ...
, like the rights to read, write or re-store the modified data in the cloud. ...
doi:10.1109/cloud.2013.80
dblp:conf/IEEEcloud/KaanicheBL13
fatcat:4bp4v65duvgrnpnzpzyxaonhdu
How to reverse engineer an EES device
[chapter]
1995
Lecture Notes in Computer Science
The IV is an input to the function (f3) used to encipher the LEAF. ...
In the next phase of the deployment of EES, a classified algorithm will be used for key generation. ...
doi:10.1007/3-540-60590-8_24
fatcat:elas4clruze2dnmkilo3nf5h4u
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds
2014
Proceedings of the 11th International Conference on Security and Cryptography
The separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies uniquely enables flexible and scalable deployment of the solution as well as strong security ...
The depositor U i first enciphers the data file f , as presented in Algorithm 2, based on a symmetric encryption scheme SymEnc, using a data enciphering key k. ...
Then, he can decrypt the enciphered contents. This dual encryption scheme on data then on the decrypting keys provides data confidentiality, as well as flexible access control policies. ...
doi:10.5220/0005010600050018
dblp:conf/secrypt/KaanicheLB14
fatcat:oxxfwlwzcrh55ofipyfqhosu6y
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
In this paper, we present SABE, a Selective Attribute-based Encryption scheme, as a new threshold multilevel access control mechanism based on an original use of attribute based encryption schemes. ...
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. ...
After a time t , this probability is equal to 1 ξ c +1 . ...
doi:10.5220/0006855503210333
dblp:conf/icete/KaanicheL18
fatcat:7bagckne2jf4pax2hrggd2rnjm
Rijndael for Sensor Networks: Is Speed the Main Issue?
2007
Electronical Notes in Theoretical Computer Science
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. ...
An evolution of this scheme is group keying which also allows passive participation and local broadcast. ...
For example, after the recent terroristic events, there is a pressing need for the deployment of efficient and low-cost infrastructures for the detection of chemical or biological agents. ...
doi:10.1016/j.entcs.2006.11.010
fatcat:zwhnjyttzzeqraklmiydvdyste
Beacons for authentication in distributed systems
1996
Journal of Computer Security
The modified protocol would be suitable for deployment at upper layers of the communication stack. ...
The modified protocol would pe suitable for deployment at upper layers of the communication stack. ...
In the remainder of this paper "{} z" means encipher with kcy Z. ...
doi:10.3233/jcs-1996-4105
fatcat:ivliqbbuqfdsnnfexpxc3thoda
Beacon based authentication
[chapter]
1994
Lecture Notes in Computer Science
The modified protocol would be suitable for deployment at upper layers of the communication stack. ...
We can assume that the contracts can be signed by a suitable electronic signature scheme. ...
Many such systems have been designed and examples of such schemes can be found in [19, 15] . ...
doi:10.1007/3-540-58618-0_60
fatcat:cpg5gozbmbglzovfkfnbguwrre
A blockchain-based data usage auditing architecture with enhanced privacy and availability
2017
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)
, (iii) required information to be stored in the contract, (iv) access patterns and (v) blockchain architecture w.r.t. different models of deployments. ...
After approving the data usage request, O builds the data section part (p 2 ) of the contract. ...
doi:10.1109/nca.2017.8171384
dblp:conf/nca/KaanicheL17
fatcat:ziczgbel2nf37gp36qlyflwwcq
Erection of Comprehensive Wellness Programme for Global Healthcare Monitoring System using AODV Protocol with Data Clustering Schema
2015
Indian Journal of Science and Technology
The AODV Protocol is modified according to the condition of the patient: When there is an emergency for immediate healthcare, Modified Event Driven AODV (MED-AODV) is proposed. ...
Findings: An Expertise System for hospitals is developed in detecting disease and to reduce the treatment time of patients in an efficient manner. ...
In this research, an effective and the flexible storage scheme of cloud data using Eucalyptus v3.4 with explicit dynamic data support to ensure the correctness, privacy, security, integrity, validity and ...
doi:10.17485/ijst/2015/v8i17/65446
fatcat:ylf6uiwtynbq7mqcwlbx7o6d5y
Disk encryption: do we need to preserve length?
2017
Journal of Cryptographic Engineering
The notion of a tweakable enciphering scheme (TES) has been formalised as the appropriate primitive for disk encryption and it has been argued that they provide the maximum security possible for a tag-less ...
It has been almost canonised that an encryption scheme suitable for the application of disk encryption must be length preserving, i.e., it rules out the use of schemes like authenticated encryption where ...
The only guarantee that such schemes can provide is that an adversarially modified ciphertext will get decrypted to a random plaintext. ...
doi:10.1007/s13389-016-0147-0
fatcat:6xqudl2ekjdxlf6b7i7ptlw45a
An ID-based authentication scheme for the IEEE 802.11s Mesh Network
2010
2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications
In this paper, we propose an ID-based method, as an alternative to the PKI, to provide nodes with private and public keys, and we present an authentication scheme that uses the ID-based cryptographic concepts ...
As illustrated in the paper, the authentication scheme is shown as suitable to the WMN networks. ...
The AS next computes and sends it to its owner enciphered with .
B. ...
doi:10.1109/wimob.2010.5645055
dblp:conf/wimob/BoudguigaL10
fatcat:zfc7fy7defhijiwcnj3dwt2dm4
ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments
2020
Frontiers in Blockchain
Moreover, thanks to the usage of hierarchical ID-based encryption and signature schemes, the proposed solution protects and ensures the confidentiality of users' personal data shared with multiple data ...
(NCA), and is an extended discussion of Kaaniche and Laurent (2017c) with regard to smart contract design models and public vs. private blockchains. ...
ACKNOWLEDGMENTS This paper is an extended and revised version of our former conference work (Kaaniche and Laurent, 2017b) accepted in the 16th International Symposium on Network Computing and Applications ...
doi:10.3389/fbloc.2020.00017
fatcat:nzkgpcvf3zej7ararkfkldxxci
« Previous
Showing results 1 — 15 out of 200 results