Filters








200 Hits in 3.1 sec

Modifying an Enciphering Scheme After Deployment [chapter]

Paul Grubbs, Thomas Ristenpart, Yuval Yarom
2017 Lecture Notes in Computer Science  
Frequent real-world examples are migrating from a token-based encryption system for credit-card numbers to a format-preserving encryption (FPE) scheme, or extending the message space of an already deployed  ...  Assume that a symmetric encryption scheme has been deployed and used with a secret key.  ...  The approach we explore, of modifying a scheme after deployment, has several limitations.  ... 
doi:10.1007/978-3-319-56614-6_17 fatcat:akvjku2itnhtrdglfi2jnltuea

An efficient public key cryptosystem based on dihedral group and quantum spin states

Hafiz Muhammad Waseem, Abdullah Alghafis, Majid Khan
2020 IEEE Access  
The enciphering schemes based on medium transformations by following the strict guidelines are almost used everywhere.  ...  We simulate the pixels of an image with the dihedral group and spin states for a defined phase to create confusion in it.  ...  Fig. 6 demonstrate the consistency in enciphered contents which classifies the factual assaults hard, and the plain contents have sharp drops after sharp upsurges. C.  ... 
doi:10.1109/access.2020.2987097 fatcat:5f24yto4yzerdh5pfafucmxtiy

Implementation Kalyna Algorithm in Microcontroller

Volodymyr Bilenko, Lviv Polytechnic National University, Computer Engineering Department, Valerii Hlukhov
2021 Advances in Cyber-Physical Systems  
The information security is playing an increasingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems.  ...  As an 8-bit platform, consider the family of AVR microcontrollers from Microchip (Atmel).  ...  It was developed owing to the cooperation of Ukrainian scientists and the State Special Communications Service after the national competition in the field of cryptography.  ... 
doi:10.23939/acps2021.01.008 fatcat:hednkmnlsnb73jokcxr7m3qh44

ID Based Cryptography for Cloud Data Storage

Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent
2013 2013 IEEE Sixth International Conference on Cloud Computing  
It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages.  ...  After the specification of the groups, the PKG defines a set of hash functions in accordance to the ID-based encryption and signature schemes in use [6] .  ...  , like the rights to read, write or re-store the modified data in the cloud.  ... 
doi:10.1109/cloud.2013.80 dblp:conf/IEEEcloud/KaanicheBL13 fatcat:4bp4v65duvgrnpnzpzyxaonhdu

How to reverse engineer an EES device [chapter]

Michael Roe
1995 Lecture Notes in Computer Science  
The IV is an input to the function (f3) used to encipher the LEAF.  ...  In the next phase of the deployment of EES, a classified algorithm will be used for key generation.  ... 
doi:10.1007/3-540-60590-8_24 fatcat:elas4clruze2dnmkilo3nf5h4u

CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds

Nesrine Kaaniche, Maryline Laurent, Mohammed El Barbori
2014 Proceedings of the 11th International Conference on Security and Cryptography  
The separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies uniquely enables flexible and scalable deployment of the solution as well as strong security  ...  The depositor U i first enciphers the data file f , as presented in Algorithm 2, based on a symmetric encryption scheme SymEnc, using a data enciphering key k.  ...  Then, he can decrypt the enciphered contents. This dual encryption scheme on data then on the decrypting keys provides data confidentiality, as well as flexible access control policies.  ... 
doi:10.5220/0005010600050018 dblp:conf/secrypt/KaanicheLB14 fatcat:oxxfwlwzcrh55ofipyfqhosu6y

SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control

Nesrine Kaaniche, Maryline Laurent
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
In this paper, we present SABE, a Selective Attribute-based Encryption scheme, as a new threshold multilevel access control mechanism based on an original use of attribute based encryption schemes.  ...  SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control.  ...  After a time t , this probability is equal to 1 ξ c +1 .  ... 
doi:10.5220/0006855503210333 dblp:conf/icete/KaanicheL18 fatcat:7bagckne2jf4pax2hrggd2rnjm

Rijndael for Sensor Networks: Is Speed the Main Issue?

Andrea Vitaletti, Gianni Palombizio
2007 Electronical Notes in Theoretical Computer Science  
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes.  ...  An evolution of this scheme is group keying which also allows passive participation and local broadcast.  ...  For example, after the recent terroristic events, there is a pressing need for the deployment of efficient and low-cost infrastructures for the detection of chemical or biological agents.  ... 
doi:10.1016/j.entcs.2006.11.010 fatcat:zwhnjyttzzeqraklmiydvdyste

Beacons for authentication in distributed systems

Azad Jiwa, Thomas Hardjono, Jennifer Seberry
1996 Journal of Computer Security  
The modified protocol would be suitable for deployment at upper layers of the communication stack.  ...  The modified protocol would pe suitable for deployment at upper layers of the communication stack.  ...  In the remainder of this paper "{} z" means encipher with kcy Z.  ... 
doi:10.3233/jcs-1996-4105 fatcat:ivliqbbuqfdsnnfexpxc3thoda

Beacon based authentication [chapter]

Azad Jiwa, Jennifer Seberry, Yuliang Zheng
1994 Lecture Notes in Computer Science  
The modified protocol would be suitable for deployment at upper layers of the communication stack.  ...  We can assume that the contracts can be signed by a suitable electronic signature scheme.  ...  Many such systems have been designed and examples of such schemes can be found in [19, 15] .  ... 
doi:10.1007/3-540-58618-0_60 fatcat:cpg5gozbmbglzovfkfnbguwrre

A blockchain-based data usage auditing architecture with enhanced privacy and availability

Nesrine Kaaniche, Maryline Laurent
2017 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)  
, (iii) required information to be stored in the contract, (iv) access patterns and (v) blockchain architecture w.r.t. different models of deployments.  ...  After approving the data usage request, O builds the data section part (p 2 ) of the contract.  ... 
doi:10.1109/nca.2017.8171384 dblp:conf/nca/KaanicheL17 fatcat:ziczgbel2nf37gp36qlyflwwcq

Erection of Comprehensive Wellness Programme for Global Healthcare Monitoring System using AODV Protocol with Data Clustering Schema

B. Amutha, B. Manickavasagam, Alankrit Patnaik, Karthick Nanmaran
2015 Indian Journal of Science and Technology  
The AODV Protocol is modified according to the condition of the patient: When there is an emergency for immediate healthcare, Modified Event Driven AODV (MED-AODV) is proposed.  ...  Findings: An Expertise System for hospitals is developed in detecting disease and to reduce the treatment time of patients in an efficient manner.  ...  In this research, an effective and the flexible storage scheme of cloud data using Eucalyptus v3.4 with explicit dynamic data support to ensure the correctness, privacy, security, integrity, validity and  ... 
doi:10.17485/ijst/2015/v8i17/65446 fatcat:ylf6uiwtynbq7mqcwlbx7o6d5y

Disk encryption: do we need to preserve length?

Debrup Chakraborty, Cuauhtemoc Mancillas López, Palash Sarkar
2017 Journal of Cryptographic Engineering  
The notion of a tweakable enciphering scheme (TES) has been formalised as the appropriate primitive for disk encryption and it has been argued that they provide the maximum security possible for a tag-less  ...  It has been almost canonised that an encryption scheme suitable for the application of disk encryption must be length preserving, i.e., it rules out the use of schemes like authenticated encryption where  ...  The only guarantee that such schemes can provide is that an adversarially modified ciphertext will get decrypted to a random plaintext.  ... 
doi:10.1007/s13389-016-0147-0 fatcat:6xqudl2ekjdxlf6b7i7ptlw45a

An ID-based authentication scheme for the IEEE 802.11s Mesh Network

Aymen Boudguiga, Maryline Laurent
2010 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications  
In this paper, we propose an ID-based method, as an alternative to the PKI, to provide nodes with private and public keys, and we present an authentication scheme that uses the ID-based cryptographic concepts  ...  As illustrated in the paper, the authentication scheme is shown as suitable to the WMN networks.  ...  The AS next computes and sends it to its owner enciphered with . B.  ... 
doi:10.1109/wimob.2010.5645055 dblp:conf/wimob/BoudguigaL10 fatcat:zfc7fy7defhijiwcnj3dwt2dm4

ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments

Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth
2020 Frontiers in Blockchain  
Moreover, thanks to the usage of hierarchical ID-based encryption and signature schemes, the proposed solution protects and ensures the confidentiality of users' personal data shared with multiple data  ...  (NCA), and is an extended discussion of Kaaniche and Laurent (2017c) with regard to smart contract design models and public vs. private blockchains.  ...  ACKNOWLEDGMENTS This paper is an extended and revised version of our former conference work (Kaaniche and Laurent, 2017b) accepted in the 16th International Symposium on Network Computing and Applications  ... 
doi:10.3389/fbloc.2020.00017 fatcat:nzkgpcvf3zej7ararkfkldxxci
« Previous Showing results 1 — 15 out of 200 results