Showing 1 - 19 results of 19 for search '"Concrete security"', query time: 0.47s Refine Results
  1. 1
  2. 2

    Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited by Huiwen Jia, Yupu Hu, Chunming Tang

    Published 2022-01-01
    “…(a) Mode 1 admits to achieve the ‘win–win’ scenario, that is, gain concrete security and simultaneously reduce the signature size. …”
    Get full text
    Article
  3. 3

    Provable Secure Parallel Gadgets by Francesco Berti, Sebastian Faust, Maximilian Orlt

    Published 2023-08-01
    “…Finally, we evaluate concrete security levels, and show how our new methodology can further improve the concrete security level of masking schemes. …”
    Get full text
    Article
  4. 4

    A Smart Card Based Security Extension for The Bitcoin Wallets by Majid Amjad Hussain, Sadia Khalil, Shahzad Saleem

    Published 2016-12-01
    “…The developers are trying to implement concrete security solutions in Bitcoin wallets to ensure that no vulnerability gets exploited. …”
    Get full text
    Article
  5. 5

    Lattice‐based cryptosystems in standardisation processes: A survey by Anyu Wang, Dianyan Xiao, Yang Yu

    Published 2023-03-01
    “…We also recap some main cryptanalytic results and methods for estimating the concrete security of lattice‐based schemes.…”
    Get full text
    Article
  6. 6

    Detecting DDoS Attacks in IoT-Based Networks Using Matrix Profile by Mohammed Ali Alzahrani, Ali M. Alzahrani, Muhammad Shoaib Siddiqui

    Published 2022-08-01
    “…However, most of these devices use cheap hardware and lack a concrete security defence system. This may encourage hackers to recruit these devices and use them to launch Distributed Denial of Service (DDoS) attacks, which is one of the main causes of concern among security engineers. …”
    Get full text
    Article
  7. 7

    Security estimation of LWE via BKW algorithms by Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang

    Published 2023-09-01
    “…We introduce the framework and key techniques of BKW algorithms and make comparisons between different BKW algorithms and also with lattice methods by estimating concrete security of specific LWE instances. We also briefly discuss the current problems and potential future directions of BKW algorithms.…”
    Get full text
    Article
  8. 8

    Security issues and system structure of internet of vehicles by Liang-min WANG, Ting-ting LI, Long CHEN

    Published 2016-02-01
    “…Instead of focusing on concrete security requirements of each IOV applying scenario,the architecture characteristics of the IOV networking systems were summarized,and the main security problems were extracted by analyzing the connotation and network architecture of IOV in different development stages.Then an identity authen-tication based three-tier security architecture over the clearly analyzed concept and structure was proposed,and the related IOV security research with the view of the presented three-tier security architecture were surveyed.Finally,some new developments and progresses over security of IOV were presented.…”
    Get full text
    Article
  9. 9

    New security notions and relations for public-key encryption by Sepahi Reza, Pieprzyk Josef, Shahandashti Siamak F., Schoenmakers Berry

    Published 2012-12-01
    “…The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.…”
    Get full text
    Article
  10. 10

    Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport by Bogdan Groza, Adriana Berdich, Camil Jichici, Rene Mayrhofer

    Published 2020-01-01
    “…The main goal of our work is to establish the amount of entropy that can be collected from these environments in order to determine concrete security bounds for each environment. We test several signal processing techniques on the extracted data, e.g., low-pass and high-pass filters, then apply sigma-delta modulation in order to expand the size of the feature vectors and increase both the pairing success rate and security level. …”
    Get full text
    Article
  11. 11

    Farfalle: parallel permutation-based cryptography by Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer

    Published 2017-12-01
    “…As a showcase, we present Kravatte, a very efficient instance of Farfalle based on Keccak-p[1600, nr] permutations and formulate concrete security claims against classical and quantum adversaries. …”
    Get full text
    Article
  12. 12

    On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices by Da-Zhi Sun, Yi-Na Gao, Yangguang Tian

    Published 2023-07-01
    “…To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. …”
    Get full text
    Article
  13. 13

    Cache-Timing Attacks on RSA Key Generation by Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley

    Published 2019-08-01
    “…During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. …”
    Get full text
    Article
  14. 14

    Towards deep learning models resistant to adversarial attacks by Madry, A, Makelov, A, Schmidt, L, Tsipras, D, Vladu, A

    Published 2021
    “…In particular, they specify a concrete security guarantee that would protect against a well-defined class of adversaries. …”
    Get full text
    Article
  15. 15
  16. 16

    A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing by Haifeng Li, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, He Guo

    Published 2020-08-01
    “…Different from the current schemes, our novel scheme can enjoy the following promising merits simultaneously: (1) Supporting verifiable outsourced decryption, i.e., the mobile user can ensure the validity of the transformed ciphertext returned from the cloud server; (2) resisting decryption key exposure, i.e., our proposed scheme can outsource decryption for intensive computing tasks during the decryption phase without revealing the user’s data or decryption key; (3) achieving a CCA security level; thus, our novel scheme can be applied to the scenarios with higher security level requirement. The concrete security proof and performance analysis illustrate that our novel scheme is proven secure and suitable for the mobile cloud computing environment.…”
    Get full text
    Article
  17. 17

    Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards by Alexander May, Carl Richard Theodor Schneider

    Published 2023-08-01
    “…Namely, unless dlogs are easy to compute on these curves G, we provide a very concrete security guarantee that DH in G must also be hard. …”
    Get full text
    Article
  18. 18

    On Efficient and Secure Code-based Masking: A Pragmatic Evaluation by Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu

    Published 2022-06-01
    “…From the perspective of practical security, we carry out an extensive evaluation of the concrete security of code-based masking in the real world. …”
    Get full text
    Article
  19. 19

    Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks by Guilin Wang, Hua Shen, Liquan Chen, Jinguang Han, Ge Wu

    Published 2023-12-01
    “…To handle these two issues, we propose a concrete secure construction that can withstand this attack. …”
    Get full text
    Article