نتایج جستجو برای: box key

تعداد نتایج: 632676  

Journal: :IACR Cryptology ePrint Archive 2001
Jeff Yan Yongdong Wu

In Crypto’99, Boneh and Franklin proposed a public key traitor tracing scheme [1], which was believed to be able to catch all traitors while not accusing any innocent users (i.e., full-tracing and errorfree). Assuming that Decision Diffie-Hellman problem is unsolvable in Gq, Boneh and Franklin proved that a decoder cannot distinguish valid ciphertexts from invalid ones that are used for tracing...

Journal: :Entropy 2014
Chong Fu Jun-Bin Huang Ning-Ning Wang Qi-Bin Hou Weimin Lei

Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaosbased image cipher with a 3D cat map-based spatial...

2003
T. Kivinen

This document describes how to detect one or more network address translation devices (NATs) between IPsec hosts, and how to negotiate the use of UDP encapsulation of the IPsec packets through the NAT boxes in Internet Key Exchange (IKE). T. Kivinen, et. al. [page 1] INTERNET-DRAFT 29 Sep 2003 Table of

2016
Pascal Sasdrich Amir Moradi Tim Güneysu

Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...

Journal: :International Journal of Distributed Sensor Networks 2019

Journal: :Turkish Journal of Computer and Mathematics Education (TURCOMAT) 2021

Journal: :EURASIP Journal on Wireless Communications and Networking 2020

Journal: :IACR Cryptology ePrint Archive 2014
Chung Hun Baek Jung Hee Cheon Hyunsook Hong

White-box cryptography is an obfuscation technique to protect the secret key in the software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. This concept was presented in 2002 by Chow et al., and since then there have been many proposals to give solutions for the white-box cryptography. However...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید