Randomized block size (RBS) model for secure data storage in distributed server
Today distributed data storage service are being widely used. However lack of proper
means of security makes the user data vulnerable. In this work, we propose a Randomized …
means of security makes the user data vulnerable. In this work, we propose a Randomized …
Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption
Cryptography is the technique of hiding and transmitting confidential information via the
internet. There are various traditional cryptographic approaches have been presented by …
internet. There are various traditional cryptographic approaches have been presented by …
Post-quantum security of plain OAEP transform
E Ebrahimi - IACR International Conference on Public-Key …, 2022 - Springer
In this paper, we show that OAEP transform is indistinguishable under chosen ciphertext
attack in the quantum random oracle model if the underlying trapdoor permutation is …
attack in the quantum random oracle model if the underlying trapdoor permutation is …
Instantiability of classical random-oracle-model encryption transforms
Extending work leveraging program obfuscation to instantiate random-oracle-based
transforms (eg, Hohenberger et al., EUROCRYPT 2014, Kalai el al., CRYPTO 2017), we …
transforms (eg, Hohenberger et al., EUROCRYPT 2014, Kalai el al., CRYPTO 2017), we …
How to dynamically incentivize sufficient level of IoT security
J Su, M Bartholic, A Stange, R Ushida… - … Cryptography and Data …, 2020 - Springer
This paper propose an incentive mechanism to secure large numbers of devices through the
use of insurance based on smart contracts. It consists of the automated security evaluation of …
use of insurance based on smart contracts. It consists of the automated security evaluation of …
Post-quantum Security of OAEP Transform
E Ebrahimi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we show that OAEP transform is indistinguishable under chosen ciphertext
attack in the quantum random oracle model if the underlying trapdoor permutation is …
attack in the quantum random oracle model if the underlying trapdoor permutation is …
Stronger Security for Practical Encryption Schemes
MZ Darkahi - 2020 - search.proquest.com
Despite recent advances in cryptography, security analyses of encryption schemes fall short
of ruling out some possible attacks. Here we study two such types of attacks: selective …
of ruling out some possible attacks. Here we study two such types of attacks: selective …