-
1
A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE
Published 2019-01-01Subjects: Get full text
Article -
2
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…(a) Mode 1 admits to achieve the ‘win–win’ scenario, that is, gain concrete security and simultaneously reduce the signature size. …”
Get full text
Article -
3
Provable Secure Parallel Gadgets
Published 2023-08-01“…Finally, we evaluate concrete security levels, and show how our new methodology can further improve the concrete security level of masking schemes. …”
Get full text
Article -
4
A Smart Card Based Security Extension for The Bitcoin Wallets
Published 2016-12-01“…The developers are trying to implement concrete security solutions in Bitcoin wallets to ensure that no vulnerability gets exploited. …”
Get full text
Article -
5
Lattice‐based cryptosystems in standardisation processes: A survey
Published 2023-03-01“…We also recap some main cryptanalytic results and methods for estimating the concrete security of lattice‐based schemes.…”
Get full text
Article -
6
Detecting DDoS Attacks in IoT-Based Networks Using Matrix Profile
Published 2022-08-01“…However, most of these devices use cheap hardware and lack a concrete security defence system. This may encourage hackers to recruit these devices and use them to launch Distributed Denial of Service (DDoS) attacks, which is one of the main causes of concern among security engineers. …”
Get full text
Article -
7
Security estimation of LWE via BKW algorithms
Published 2023-09-01“…We introduce the framework and key techniques of BKW algorithms and make comparisons between different BKW algorithms and also with lattice methods by estimating concrete security of specific LWE instances. We also briefly discuss the current problems and potential future directions of BKW algorithms.…”
Get full text
Article -
8
Security issues and system structure of internet of vehicles
Published 2016-02-01“…Instead of focusing on concrete security requirements of each IOV applying scenario,the architecture characteristics of the IOV networking systems were summarized,and the main security problems were extracted by analyzing the connotation and network architecture of IOV in different development stages.Then an identity authen-tication based three-tier security architecture over the clearly analyzed concept and structure was proposed,and the related IOV security research with the view of the presented three-tier security architecture were surveyed.Finally,some new developments and progresses over security of IOV were presented.…”
Get full text
Article -
9
New security notions and relations for public-key encryption
Published 2012-12-01“…The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.…”
Get full text
Article -
10
Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport
Published 2020-01-01“…The main goal of our work is to establish the amount of entropy that can be collected from these environments in order to determine concrete security bounds for each environment. We test several signal processing techniques on the extracted data, e.g., low-pass and high-pass filters, then apply sigma-delta modulation in order to expand the size of the feature vectors and increase both the pairing success rate and security level. …”
Get full text
Article -
11
Farfalle: parallel permutation-based cryptography
Published 2017-12-01“…As a showcase, we present Kravatte, a very efficient instance of Farfalle based on Keccak-p[1600, nr] permutations and formulate concrete security claims against classical and quantum adversaries. …”
Get full text
Article -
12
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
Published 2023-07-01“…To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. …”
Get full text
Article -
13
Cache-Timing Attacks on RSA Key Generation
Published 2019-08-01“…During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. …”
Get full text
Article -
14
Towards deep learning models resistant to adversarial attacks
Published 2021“…In particular, they specify a concrete security guarantee that would protect against a well-defined class of adversaries. …”
Get full text
Article -
15
Secure application partitioning for intellectual property protection
Published 2006Get full text
Thesis -
16
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing
Published 2020-08-01“…Different from the current schemes, our novel scheme can enjoy the following promising merits simultaneously: (1) Supporting verifiable outsourced decryption, i.e., the mobile user can ensure the validity of the transformed ciphertext returned from the cloud server; (2) resisting decryption key exposure, i.e., our proposed scheme can outsource decryption for intensive computing tasks during the decryption phase without revealing the user’s data or decryption key; (3) achieving a CCA security level; thus, our novel scheme can be applied to the scenarios with higher security level requirement. The concrete security proof and performance analysis illustrate that our novel scheme is proven secure and suitable for the mobile cloud computing environment.…”
Get full text
Article -
17
Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards
Published 2023-08-01“…Namely, unless dlogs are easy to compute on these curves G, we provide a very concrete security guarantee that DH in G must also be hard. …”
Get full text
Article -
18
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
Published 2022-06-01“…From the perspective of practical security, we carry out an extensive evaluation of the concrete security of code-based masking in the real world. …”
Get full text
Article -
19
Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks
Published 2023-12-01“…To handle these two issues, we propose a concrete secure construction that can withstand this attack. …”
Get full text
Article