Optimizing a password hashing function with hardware-accelerated symmetric encryption

R Álvarez, A Andrade, A Zamora - Symmetry, 2018 - mdpi.com
Password-based key derivation functions (PBKDFs) are commonly used to transform user
passwords into keys for symmetric encryption, as well as for user authentication, password …

A secret and traceable approach for cloud data sharing

C Xu, Y Yin, Y Chen - … Conference on Cyber Security and Cloud …, 2023 - ieeexplore.ieee.org
With the development of cloud computing, data owners generally use cloud services to
reduce storage and computing overhead. However, data stored in cloud servers is out of the …

SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation

F Yu, Y Huang - Symmetry, 2024 - mdpi.com
Efficient safeguarding of the security of interconnected devices, which are often resource-
constrained, can be achieved through collective remote attestation schemes. However, in …

Ciphertext-Police Attribute Based Encryption Performance on Notebook Device

GT Suryawan, S Andika - 2019 International Symposium on …, 2019 - ieeexplore.ieee.org
Cryptography is a technique to secure communication or exchange messages between one
user with another user, by encrypting the message to be sent guaranteed to be safe from …