نتایج جستجو برای: box key

تعداد نتایج: 632676  

Journal: :IACR Cryptology ePrint Archive 2012
Zhen Liu Zhenfu Cao Duncan S. Wong

In a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system, decryption privileges are defined over attributes that could be shared by multiple users. If some of the users leak their decryption privileges to the public or to some third party, say for profit gain, a conventional CP-ABE has no tracing mechanism for finding these malicious users out. There are two levels of traceability for ...

Journal: :IACR Cryptology ePrint Archive 2016
David Derler Daniel Slamanig

Key-homomorphic properties of cryptographic objects have proven to be useful, both from a theoretical as well as a practical perspective. Important cryptographic objects such as pseudorandom functions or (public key) encryption have been studied previously with respect to key-homomorphisms. Interestingly, however, signature schemes have not been explicitly investigated in this context so far. W...

1999
Doug Whiting John Kelsey Bruce Schneier David Wagner Niels Ferguson Chris Hall

Twofish is a 128-bit block cipher submitted as an AES candidate [SKW+98]. Mirza and Murphy [MM99] recently noted two interesting properties in the Twofish key schedule for 128-bit keys: there is a non-uniform distribution of 128-bit whitening keys, and the 64-bit round subkeys are non-uniformly distributed over each subset of keys that fixes the S-boxes. This paper extends these results and exp...

Journal: :IACR Cryptology ePrint Archive 2011
Steven Myers Mona Sergi Abhi Shelat

Cramer, Damgård, and Nielsen [CDN01] show how to construct an efficient secure multiparty computation scheme using a threshold homomorphic encryption scheme that has four properties i) a honest-verifier zero-knowledge proof of knowledge of encrypted values, ii) proving multiplications correct iii) threshold decryption and iv) trusted shared key setup. Naor and Nissim [NN01a] show how to constru...

1999
Sherman D. Riemenschneider Zuowei Shen

This paper presents a construction of compactly supported biorthogonal spline wavelets in L2(IR ). In particular, a concrete method for the construction of bivariate compactly supported biorthogonal wavelets from box splines of increasing smoothness is provided. Several examples are given to illustrate the method. Key-Words:multivariate biorthogonal wavelets, multivariate wavelets, box splines,...

2003

This thesis focuses on cryptanalysis techniques and design of block ciphers. In particular, modern analysis methods such as square, boomerang, impossible differential and linear attacks are described and applied to real block ciphers. The first part of this thesis concentrates on the two most relevant modern cryptanalysis techniques: linear and differential cryptanalysis. These and related tech...

2011
Tong-Bao Liu Chaoyang Xue

The ubiquitin-proteasome system is one of the major protein turnover mechanisms that plays important roles in the regulation of a variety of cellular functions. It is composed of E1 (ubiquitin-activating enzyme), E2 (ubiquitin-conjugating enzyme), and E3 ubiquitin ligases that transfer ubiquitin to the substrates that are subjected to degradation in the 26S proteasome. The Skp1, Cullin, F-box p...

2017
David Derler Daniel Slamanig

Key-homomorphic properties of cryptographic objects have proven to be useful, both from a theoretical as well as a practical perspective. Important cryptographic objects such as pseudorandom functions or (public key) encryption have been studied previously with respect to key-homomorphisms. Interestingly, however, signature schemes have not been explicitly investigated in this context so far. W...

2014
Ailan Wang Mingchuan Fu Xiaoqian Jiang Yuanhui Mao Xiangchen Li Shiheng Tao

F-box proteins are substrate adaptors used by the SKP1-CUL1-F-box protein (SCF) complex, a type of E3 ubiquitin ligase complex in the ubiquitin proteasome system (UPS). SCF-mediated ubiquitylation regulates proteolysis of hundreds of cellular proteins involved in key signaling and disease systems. However, our knowledge of the evolution of the F-box gene family in Euarchontoglires is limited. I...

2013
Jun Peng Shangzhu Jin Liang Lei Rong Jia

The substitution box (S-box) is found in many block cipher, and it is a very important component. Since the chaotic system has several significant advantageous properties desirable for cryptosystem, the design of S-box using chaos has attracted a great deal of attention in recent years. In this paper, a novel method for designing key-dependent S-boxes based on a four-dimensional hyperchaotic Ch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید