نتایج جستجو برای: chryseobacterium indologenes

تعداد نتایج: 670  

2004
Ivan Osipkov Yongdae Kim Jung Hee Cheon

In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypt...

2013
Guangjun Fan Yongbin Zhou Dengguo Feng

Yoneyama et al. introduces the Leaky Random Oracle Model at ProvSec2008 to capture the leakages from the hash list of a hash function used by a cryptography construction due to various attacks caused by sloppy usages or implementations in the real world. However, an important fact is that such attacks would leak not only the hash list, but also other secret states (e.g. the secret key) outside ...

2004
Eike Kiltz

We describe a practical identity-based encryption scheme that is secure in the standard model against chosen-ciphertext (IND-CCA2) attacks. Security is based on an assumption comparable to (but slightly stronger than) Bilinear Decisonal Diffie-Hellman (BDDH). A comparison shows that our construction outperforms all known identity-based encryption schemes in the standard model and its performanc...

2001
Tatsuaki Okamoto David Pointcheval

The last few months, several new results appeared about the OAEP construction , and namely the RSA{OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an eecient exact security level, the eeective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) had ...

Journal: :Acta virologica 2009
A Raja G Dhinakar Raj P Bhuvaneswari C Balachandran K Kumanan

Marek's disease virus (MDV) isolated from poultry flocks in three states of India was monitored for the virus occurrence in the field. The MDV genome was isolated from feather follicles, spleen, and liver of the chicken (173 samples). Twenty two samples were positive for MDV genome in PCR and belonged to the serotype 1. The sequencing of MEQ gene of 11 samples revealed that nucleotide sequences...

Journal: :Saudi pharmaceutical journal : SPJ : the official publication of the Saudi Pharmaceutical Society 2009
Mahmoud El-Badry Gihan Fetih Mohamed Fathy

The aim of this study was to prepare and characterize solid dispersions of water insoluble non-steroidal anti-inflammatory drug, indomethacin (IND), with polyethylene glycol 4000 (PEG4000) and Gelucire 50/13 (Gelu.) for enhancing the dissolution rate of the drug. The solid dispersions (SDs) were prepared by hot melting method at 1:1, 1:2 and 1:4 drug to polymer ratios. Scanning electron microsc...

2011
Li Bin

In order to resist the damage of digital text works in high BER networks or illegal copy in publication, we propose a robust feature-extracting algorithm based on threshold technology and then construct a new threshold birthmark algorithm. The information gain rate has been used to veraciously measure the importance of the feature in feature-extracting, and threshold(t,n) technology has also be...

2004
Bartosz Zoltak

We analyse the consequences of the specific properties of the key-setup phase in symmetric encryption schemes for their security. We find that key-setup routines satisfying IND-CNA and one-wayness allow to construct schemes which are provably secure against key-recovery attacks. We propose a specific cryptosystem for which we show that the key-setup routine ensures a significant increase in the...

2013
Guangjun Fan Yongbin Zhou Dengguo Feng

K. Yoneyama et al. introduces the Leaky Random Oracle Model at ProvSec2008, which only considers the leakage of the hash list of a hash function used by a cryptosystem due to various attacks caused by implementation or sloppy usages. However, an important fact is that such attacks not only leak the hash list of a hash function, but also leak other secret states outside the hash list of a crypto...

2013
Fenghe Wang Chunxiao Wang Yupu Hu

Using the Bonsai trees primitive and Gentry’s CPA-secure (chosen-plaintext attack) public-key encryption (PKE) scheme, we propose an efficient chosen-ciphtertext secure PKE scheme over lattice. If the decision variant of the learning with errors (LWE) problem is hard and the one-time signature used in this scheme is strong unforgeable, the proposed PKE scheme is indistinguishable against the ad...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید