نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

Journal: :CoRR 2017
Aubrey Alston

Steganography is the task of concealing a message within a medium such that the presence of the hidden message cannot be detected. Though the prospect of steganography is conceivably interesting in many contexts, and though work has been done both towards formalizing steganographic security and providing provably secure constructions, little work exists attempting to provide efficient and prova...

2012
Jayadev Acharya Hirakendu Das Ashkan Jafarpour Alon Orlitsky Shengjun Pan Ananda Theertha Suresh

We study the problems of classification and closeness testing. A classifier associates a test sequence with the one of two training sequences that was generated by the same distribution. A closeness test determines whether two sequences were generated by the same or by different distributions. For both problems all natural algorithms are symmetric—they make the same decision under all symbol re...

2012
Svetla Nikova Andrey Bogdanov

Project co-funded by the European Commission within the 7th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...

2016
Mihir Bellare Daniel Kane Phillip Rogaway

This paper aims to move research in the bounded retrieval model (BRM) from theory to practice by considering symmetric (rather than public-key) encryption, giving efficient schemes, and providing security analyses with sharp, concrete bounds. The threat addressed is malware that aims to exfiltrate a user’s key. Our schemes aim to thwart this by using an enormously long key, yet paying for this ...

Journal: :CoRR 2017
Yue Fu

In this paper a secure data-sharing protocol under blockchain-based decentralised storage architecture is proposed, which fulfils users who need to share their encrypted data oncloud. It implements a remote data-sharing mechanism that enables data owners to share their encrypted data to other users without revealing the original key. Nor do they have to download on-cloud data with re-encryption...

2007
Steve Kremer Laurent Mazaré

We define a framework to reason about implementations of equational theories in the presence of an adaptive adversary. We particularly focus on soundess of static equivalence. We illustrate our framework on different equational theories: symmetric encryption, modular exponentiation and also joint theories of encryption and modular exponentiation. Finally, we define a model for symbolic analysis...

2011
Mircea-Florin Vaida Radu Terec Lenuta Alboaie

This paper presents alternative security methods based on DNA. From the alternative security methods available, a DNA algorithm was implemented using symmetric coding in BioJava and MatLab. As results, a comparison has been made between the performances of different standard symmetrical algorithms using dedicated applications. In addition to this, we also present an asymmetric key generation an...

Journal: :CoRR 2008
Ashok Kumar Das

Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much suited for mobile sensor networks because they incur much ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید