We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A note on a standard model for Galois rings

    In this work we present a standard model for Galois rings based on the standard model of their residual fields, that is, a a sequence of Galois rings...

    E. Martínez-Moro, A. Piñera-Nicolás, I. F. Rúa in Applicable Algebra in Engineering, Communication and Computing
    Article 22 June 2023
  2. A conceptually simple and generic construction of plaintext checkable encryption in the standard model

    Plaintext-checkable encryption (PCE) can support searches over ciphertext by directly using plaintext. The functionality of a search is modeled by a...

    Article 24 February 2024
  3. Lattice-based autonomous path proxy re-encryption in the standard model

    Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the...

    Wenli **e, Jian Weng, ... Feixiang Zhao in Science China Information Sciences
    Article 23 May 2023
  4. Compact Ring Signatures with Post-Quantum Security in Standard Model

    Ring signatures allow a ring member to produce signatures on behalf of all ring users but remain anonymous. At PKC 2022, Chatterjee et al. defined...
    Tuong Ngoc Nguyen, Willy Susilo, ... Shinsaku Kiyomoto in Information Security and Cryptology
    Conference paper 2024
  5. A lightweight identity based generalized signcryption scheme for secure communication in standard model

    The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern....

    Tej Singh, Mukesh Kumar, ... Worku Jifara Sori in International Journal of Information Technology
    Article 22 December 2023
  6. About C++, C++ Standard, and the C++ Standard Library

    We start with the history of the C++ programming language and the C++ Standard library. After that, we briefly describe the C++ Standard Library and...
    Patrick Diehl, Steven R. Brandt, Hartmut Kaiser in Parallel C++
    Chapter 2024
  7. Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model

    An aggregate signature enables to aggregation of multiple signatures generated by different signers on different messages. A synchronized aggregate...
    R. Kabaleeshwaran, Panuganti Venkata Shanmukh Sai in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  8. Lifting Standard Model Reductions to Common Setup Assumptions

    In this paper we show that standard model black-box reductions naturally lift to various setup assumptions, such as the random oracle (ROM) or ideal...
    Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  9. Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model

    Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public...

    Takeshi Nakai, Keita Iwanari, ... Mitsugu Iwamoto in New Generation Computing
    Article Open access 21 June 2024
  10. Data Standard Construction

    Data standardization is a series of work on the definition and implementation of data standards to achieve data value driven business development....
    Zhengxuan Duan, Shaolei Zhou, Zhicheng Wu in Edge Computing – EDGE 2023
    Conference paper 2024
  11. Local Services Based on Non-standard Wi-Fi Direct Usage Model

    This article discusses a new model for building applied mobile services that use location information and operate in a certain limited spatial area....
    Dmitry Namiot, Manfred Sneps-Sneppe, Vladimir Sukhomlin in Internet of Things, Smart Spaces, and Next Generation Networks and Systems
    Conference paper 2023
  12. Standard model leakage-resilient authenticated key exchange using inner-product extractors

    With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner....

    Janaka Alawatugoda, Tatsuaki Okamoto in Designs, Codes and Cryptography
    Article 15 March 2022
  13. Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions

    Dual-receiver encryption (DRE) is a special form of public key encryption (PKE) that allows a sender to encrypt a message for two recipients. Without...
    Laurin Benz, Wasilij Beskorovajnov, ... Jörn Müller-Quade in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  14. Forward Secure Lattice-Based Ring Signature Scheme in the Standard Model

    A ring signature scheme allows a group member to generate a signature on behalf of the whole group, while the verifier can not tell who computed this...
    **aoling Yu, Yuntao Wang in Information and Communications Security
    Conference paper 2023
  15. Standard Distributions

    Christopher M. Bishop, Hugh Bishop in Deep Learning
    Chapter 2024
  16. Identity-based signcryption scheme for medical cyber physical system in standard model

    The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining...

    Rachana Yogesh Patil, Yogesh H. Patil in International Journal of Information Technology
    Article 04 June 2022
  17. AVS Point Cloud Compression Standard

    The development of point cloud compression standards has become a necessary method for technological development in emerging fields such as...
    Ge Li, Wei Gao, Wen Gao in Point Cloud Compression
    Chapter 2024
  18. Universal Ring Signatures in the Standard Model

    Ring signatures allow a user to sign messages on behalf of an ad hoc set of users - a ring - while hiding her identity. The original motivation for...
    Pedro Branco, Nico Döttling, Stella Wohnig in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  19. Complying with the PCI DSS Standard

    It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card...
    Chapter 2024
  20. Flexible Group Non-interactive Key Exchange in the Standard Model

    In this paper, we constructed a non-interactive group key exchange protocol (GNIKE) with flexibility, i.e., the number of participants in the GNIKE...
    Conference paper 2022
Did you find what you were looking for? Share feedback.