Method for design secure symmetric NTRU-like encryption schemes
نویسندگان
چکیده
.
منابع مشابه
Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملSecure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs
Reconfigurable computing intends to fill the gap between hardware and software, achieving potentially much higher performance than software, while maintaining a higher level of flexibility than hardware. Reconfigurable devices such as FPGAs contain arrays of computational elements whose functionality is determined through multiple programmable configuration bits. These elements, sometimes known...
متن کاملUC-Secure Searchable Symmetric Encryption
For searchable symmetric encryption schemes (or symmetrickey encryption with keyword search), the security against passive adversaries (i.e. privacy) has been mainly considered so far. In this paper, we first define its security against active adversaries (i.e. reliability as well as privacy). We next formulate its UC-security. We then prove that the UCsecurity against non-adaptive adversaries ...
متن کاملLecture 10 : Secure Symmetric Encryption
All the constructions we have shown so far are quite sequential. In order to derive pseudorandom generators of output length m we composed one-way permutations m times; to build PRFFs on length n strings from pseudorandom generators we composed generators n times. The total amount of work is an issue but more important is the delay before values are produced. (Recall that DES was particularly f...
متن کاملLightweight Symmetric Encryption Algorithm for Secure Database
Virtually all of today’s organizations store their data in huge databases to retrieve, manipulate and share them in an efficient way. Due to the popularity of databases for storing important and critical data, they are becoming subject to an overwhelming range of threats, such as unauthorized access. Such a threat can result in severe financial or privacy problems, as well as other corruptions....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information technology and security
سال: 2022
ISSN: ['2518-1033', '2411-1031']
DOI: https://doi.org/10.20535/2411-1031.2022.10.2.270406