We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Partial key exposure attack on RSA using some private key blocks

    RSA is a well-known cryptosystem in public-key cryptography and the strength of the cryptosystem depends on the hardness of factoring large integers....

    Santosh Kumar Ravva, K. L. N. C. Prakash, S. R. M. Krishna in Journal of Computer Virology and Hacking Techniques
    Article 08 November 2023
  2. Maliciously circuit-private multi-key FHE and MPC based on LWE

    In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our...

    Nuttapong Attrapadung, Goichiro Hanaoka, ... Jacob C. N. Schuldt in Designs, Codes and Cryptography
    Article Open access 30 December 2022
  3. Atomic cross-chain swap based on private key exchange

    Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two...

    Zeshuo Zhu, Rui Zhang, Yang Tao in Cybersecurity
    Article Open access 02 June 2024
  4. Small Private Key Attack Against a Family of RSA-Like Cryptosystems

    Let \(N=pq\) be the product of two balanced...
    Paul Cotan, George Teşeleanu in Secure IT Systems
    Conference paper 2024
  5. EMPSI: Efficient multiparty private set intersection (with cardinality)

    Multiparty private set intersection (PSI) allows several parties, each holding a set of elements, to jointly compute the intersection without leaking...

    Yunbo Yang, **aolei Dong, ... Shangmin Dou in Frontiers of Computer Science
    Article 06 September 2023
  6. Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

    Public key authentication (PKA) has been deployed in various services to provide stronger authentication to users. In PKA, a user manages private...
    Kodai Hatakeyama, Daisuke Kotani, Yasuo Okabe in ICT Systems Security and Privacy Protection
    Conference paper 2024
  7. Asymmetric Key Cryptography

    Asymmetric encryption is a brand-new, highly advanced encryption method that employs two keys. Public and private keys are the names given to these...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  8. BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning

    Federated Learning (FL) has emerged as a powerful technology designed for collaborative training between multiple clients and a server while...

    **nwen Gao, Shao**g Fu, ... Yuchuan Luo in Frontiers of Computer Science
    Article 23 December 2023
  9. Public and Private Key Cryptography

    Please download the sample Excel files from for this chapter’s exercises.
    Chapter 2022
  10. Private Set Operations from Multi-query Reverse Private Membership Test

    Private set operations allow two parties to perform secure computation on their private sets, including intersection, union and functions of...
    Yu Chen, Min Zhang, ... Weiran Liu in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  11. Efficient Private Multiset ID Protocols

    Private-ID (PID) protocol enables two parties, each holding a private set of items, to privately compute a set of random universal identifiers (UID)...
    Cong Zhang, Weiran Liu, ... Dongdai Lin in Information and Communications Security
    Conference paper 2023
  12. SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures

    SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...

    Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, ... André L. M. Santos in Journal of Cryptographic Engineering
    Article 16 October 2023
  13. Differentially private federated learning with non-IID data

    In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically...

    Shuyan Cheng, Peng Li, ... He Xu in Computing
    Article 08 May 2024
  14. Unbalanced private set intersection with linear communication complexity

    The private set intersection (PSI) protocol allows two parties holding a set of integers to compute the intersection of their sets without revealing...

    Quanyu Zhao, Bingbing Jiang, ... Sheng Zhong in Science China Information Sciences
    Article 05 February 2024
  15. The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method

    The rapid development of network technology has brought new challenges to data security. As the first gateway of a certain mobile internet system,...
    Tianhong Zhang, Zejun Lan, ... Jianfeng Guan in Mobile Internet Security
    Conference paper 2022
  16. Hiding the input-size in multi-party private set intersection

    Ateniese et al. (PKC 2011) introduced the concept of size-hiding private set intersection (SHI-PSI) and proposed a construction for two parties. The...

    Yu Zhan, Ziqian Zhang, ... Baocang Wang in Designs, Codes and Cryptography
    Article 24 May 2023
  17. Differentially private multi-agent constraint optimization

    Distributed constraint optimization (DCOP) is a framework in which multiple agents with private constraints (or preferences) cooperate to achieve a...

    Sankarshan Damle, Aleksei Triastcyn, ... Sujit Gujar in Autonomous Agents and Multi-Agent Systems
    Article 02 March 2024
  18. Data Security-Based Routing in MANETs Using Key Management Mechanism

    Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate...

    Jayant Y. Hande, Ritesh Sadiwala in SN Computer Science
    Article 06 January 2024
  19. Authentication and Key Establishment in WSN Based on Key Predistribution

    Abstract

    A new authentication and key establishment method for wireless sensor networks (WSNs) is proposed based on the modification of the key...

    Article 01 December 2022
  20. Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model

    Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public...

    Takeshi Nakai, Keita Iwanari, ... Mitsugu Iwamoto in New Generation Computing
    Article Open access 21 June 2024
Did you find what you were looking for? Share feedback.