Sciweavers

2108 search results - page 21 / 422
» Encrypted
Sort
View
110
Voted
CSREASAM
2006
15 years 2 months ago
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
- In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing ho...
Levent Ertaul, Vaidehi Kedlaya
95
Voted
JOC
2008
97views more  JOC 2008»
15 years 22 days ago
Tag-KEM/DEM: A New Framework for Hybrid Encryption
This paper presents a novel framework for the generic construction of hybrid encryption schemes which produces more efficient schemes than the ones known before. A previous framew...
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa
80
Voted
CORR
2002
Springer
95views Education» more  CORR 2002»
15 years 17 days ago
A Polynomial Description of the Rijndael Advanced Encryption Standard
The paper gives a polynomial description of the Rijndael Advanced Encryption Standard recently adopted by the National Institute of Standards and Technology. Special attention is ...
Joachim Rosenthal
97
Voted
IACR
2011
149views more  IACR 2011»
14 years 12 days ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
96
Voted
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 22 days ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas