搜索结果: 1-15 共查到“密码学 Symmetric”相关记录125条 . 查询时间(0.109 秒)
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Dynamic Searchable Symmetric Encryption Forward Privacy Backward Privacy
2019/9/19
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
Security of Symmetric Primitives against Key-Correlated Attacks
Key-correlated attack related-key attack key-dependent-message attack
2019/9/5
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whe...
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Security protocols Authenticated key exchange Symmetric-key cryptography
2019/8/13
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Count of rotational symmetric bent Boolean functions
Rotational Symmetric Boolean Function Algebraic Normal Form Bent Boolean Function
2019/8/2
Counting the Boolean functions having specific cryptographic features is an interesting problem in combinatorics and cryptography. Count of bent functions for more than eight variables is unexplored. ...
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Cloud Security Forward Privacy Multi-Client Symmetric Searchable Encryption
2019/7/15
Symmetric Searchable encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data, in a way that the privacy of both the files and the search que...
Scalable Private Set Union from Symmetric-Key Techniques
Private Set Union Private Membership Test
2019/7/4
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Cloud Security Storage Protection Access Control, Policies
2019/6/12
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
Securely managing encrypted data on an untrusted party is a challenging problem that has motivated the study of a variety of cryptographic primitives. A special class of such primitives allows an untr...
With this work, we intend on demonstrating the need for improvements to the currently standardized AES family of cryptosystems, and provide a solution that meets the requirements of long-term security...
Forward and Backward-Secure Range-Searchable Symmetric Encryption
dynamic symmetric searchable encryption range query forward security
2019/5/21
Dynamic searchable symmetric encryption (DSSE) allows a client to search or update over an outsourced encrypted database. Range query is commonly needed (AsiaCrypt'18) but order-preserving encryption ...
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Filter Permutator FLIP Homomorphic Encryption
2019/5/14
Motivated by the application of delegating computation, we revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorph...
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Authenticated key agreement Symmetric-key cryptography Perfect forward secrecy
2019/5/9
Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography. In particular, they can provide perfect forward sec...
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution)
Vision Rescue Marvellous
2019/4/28
While common symmetric primitives like the AES and SHA3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such ...
Tight Time-Memory Trade-offs for Symmetric Encryption
provable security time-memory trade-offs
2019/3/6
Concrete security proofs give upper bounds on the attacker's advantage as a function of its time/query complexity. Cryptanalysis suggests however that other resource limitations - most notably, the at...
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Side-Channel Attacks Deep Learning Machine Learning
2019/2/26
Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, resea...