Journal articles on the topic 'Key encapsulation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Key encapsulation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yi-Fan Tseng, Yi-Fan Tseng, Zi-Yuan Liu Yi-Fan Tseng, and Raylin Tso Zi-Yuan Liu. "A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism." 網際網路技術學刊 22, no. 5 (September 2021): 1183–95. http://dx.doi.org/10.53106/160792642021092205020.
Full textANADA, Hiroaki, and Seiko ARITA. "Identification Schemes from Key Encapsulation Mechanisms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95.A, no. 7 (2012): 1136–55. http://dx.doi.org/10.1587/transfun.e95.a.1136.
Full textWu, Jui-Di, Yuh-Min Tseng, Sen-Shan Huang, and Wei-Chieh Chou. "Leakage-Resilient Certificateless Key Encapsulation Scheme." Informatica 29, no. 1 (January 1, 2018): 125–55. http://dx.doi.org/10.15388/informatica.2018.161.
Full textPope, Emily, Bradley Haltli, Russell G. Kerr, and Ali Ahmadi. "Effects of Matrix Composition and Temperature on Viability and Metabolic Activity of Microencapsulated Marine Bacteria." Microorganisms 10, no. 5 (May 10, 2022): 996. http://dx.doi.org/10.3390/microorganisms10050996.
Full textMuhammad Fuad Al Khafiz, Yuanita Hikmahwati, Khairul Anam, and Dwi Hudiyanti. "Key conditions of alpha-tocopherol encapsulation in gum Arabic dispersions." International Journal of Research in Pharmaceutical Sciences 10, no. 4 (October 16, 2019): 2622–27. http://dx.doi.org/10.26452/ijrps.v10i4.1520.
Full textLI, Ji-Guo, Hai-Shan YANG, and Yi-Chen ZHANG. "Certificate-Based Key Encapsulation Mechanism with Tags." Journal of Software 23, no. 8 (September 11, 2012): 2163–72. http://dx.doi.org/10.3724/sp.j.1001.2012.04127.
Full textHANAOKA, Goichiro, Takahiro MATSUDA, and Jacob C. N. SCHULDT. "A New Combiner for Key Encapsulation Mechanisms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 12 (December 1, 2019): 1668–75. http://dx.doi.org/10.1587/transfun.e102.a.1668.
Full textBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, et al. "DAGS: Key encapsulation using dyadic GS codes." Journal of Mathematical Cryptology 12, no. 4 (December 1, 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Full textManulis, Mark, Bertram Poettering, and Douglas Stebila. "Plaintext awareness in identity-based key encapsulation." International Journal of Information Security 13, no. 1 (November 22, 2013): 25–49. http://dx.doi.org/10.1007/s10207-013-0218-5.
Full textQin, Baodong, Shengli Liu, Shifeng Sun, Robert H. Deng, and Dawu Gu. "Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman." Information Sciences 406-407 (September 2017): 1–11. http://dx.doi.org/10.1016/j.ins.2017.04.018.
Full textLAI, Xin, and Da-Ke HE. "Cryptographic Workflow Key Encapsulation Mechanism Based on Signcryption." Journal of Software 20, no. 10 (November 6, 2009): 2810–21. http://dx.doi.org/10.3724/sp.j.1001.2009.03426.
Full textZhao, Zhan Feng, and Juan Ye. "Design Key Points for High Power LED Encapsulation." Advanced Materials Research 651 (January 2013): 706–9. http://dx.doi.org/10.4028/www.scientific.net/amr.651.706.
Full textLu, Yang, and Jiguo Li. "Efficient constructions of certificate-based key encapsulation mechanism." International Journal of Internet Protocol Technology 8, no. 2/3 (2014): 96. http://dx.doi.org/10.1504/ijipt.2014.066374.
Full textHu, Jingwei, Marco Baldi, Paolo Santini, Neng Zeng, San Ling, and Huaxiong Wang. "Lightweight Key Encapsulation Using LDPC Codes on FPGAs." IEEE Transactions on Computers 69, no. 3 (March 1, 2020): 327–41. http://dx.doi.org/10.1109/tc.2019.2948323.
Full textLutsenko, M. S. "Post-quantum algorithm of Classic McEliece key encapsulation." Radiotekhnika, no. 203 (December 23, 2020): 82–90. http://dx.doi.org/10.30837/rt.2020.4.203.06.
Full textZajac, Pavol. "Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications." Sensors 21, no. 6 (March 13, 2021): 2036. http://dx.doi.org/10.3390/s21062036.
Full textZhang, Ping, Yamin Li, and Muhua Liu. "An Indistinguishably Secure Function Encryption Scheme." Security and Communication Networks 2019 (November 5, 2019): 1–10. http://dx.doi.org/10.1155/2019/8567534.
Full textMinovski, Blago, Jelena Andrić, Lennart Löfdahl, and Peter Gullberg. "A numerical investigation of thermal engine encapsulation concept for a passenger vehicle and its effect on fuel consumption." Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 233, no. 3 (January 9, 2018): 557–71. http://dx.doi.org/10.1177/0954407017749074.
Full textYang, Zheng. "On constructing practical multi-recipient key-encapsulation with short ciphertext and public key." Security and Communication Networks 8, no. 18 (September 6, 2015): 4191–202. http://dx.doi.org/10.1002/sec.1334.
Full textPersichetti, Edoardo, Rainer Steinwandt, and Adriana Suárez Corona. "From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives †." Entropy 21, no. 12 (November 30, 2019): 1183. http://dx.doi.org/10.3390/e21121183.
Full textAhubele, B. O., and L. U. Oghenekaro. "Secured Electronic Voting System Using RSA Key Encapsulation Mechanism." European Journal of Electrical Engineering and Computer Science 6, no. 2 (April 25, 2022): 81–87. http://dx.doi.org/10.24018/ejece.2022.6.2.427.
Full textLee, Joohee, Duhyeong Kim, Hyungkyu Lee, Younho Lee, and Jung Hee Cheon. "RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices." IEEE Access 7 (2019): 2080–91. http://dx.doi.org/10.1109/access.2018.2884084.
Full textGyöngyvér, Márton. "Cca-Secure Key Encapsulation Mechanism Based on Factoring Assumption." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 137–46. http://dx.doi.org/10.2478/v10127-012-0043-7.
Full textSeo, Minhye, Jung Yeon Hwang, Soo-hyung Kim, and Jong Hwan Park. "Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism." Journal of the Korea Institute of Information Security and Cryptology 26, no. 1 (February 29, 2016): 69–79. http://dx.doi.org/10.13089/jkiisc.2016.26.1.69.
Full textAussignargues, Clément, Bradley C. Paasch, Raul Gonzalez-Esquer, Onur Erbilgin, and Cheryl A. Kerfeld. "Bacterial microcompartment assembly: The key role of encapsulation peptides." Communicative & Integrative Biology 8, no. 3 (May 4, 2015): e1039755. http://dx.doi.org/10.1080/19420889.2015.1039755.
Full textGalindo, David, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, and Srinivas Vivek. "Implementation of a leakage-resilient ElGamal key encapsulation mechanism." Journal of Cryptographic Engineering 6, no. 3 (February 29, 2016): 229–38. http://dx.doi.org/10.1007/s13389-016-0121-x.
Full textLong, Yu, and Kefei Chen. "Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism." Information Sciences 180, no. 7 (April 2010): 1167–81. http://dx.doi.org/10.1016/j.ins.2009.12.008.
Full text赖, 建昌, 欣沂 黄, 德彪 何, and 玮. 伍. "Security analysis of uppercaseSM9 digital signature and key encapsulation." SCIENTIA SINICA Informationis 51, no. 11 (November 1, 2021): 1900. http://dx.doi.org/10.1360/ssi-2021-0049.
Full textYang, Junhan, and Tianjie Cao. "Provably Secure Three-Party Authenticated Key Exchange Based on Certificateless Key Encapsulation Sensor Mechanism." Sensor Letters 11, no. 11 (November 1, 2013): 2141–44. http://dx.doi.org/10.1166/sl.2013.2960.
Full textRudkevich, Dmitry M., and Alexander V. Leontiev. "Molecular Encapsulation of Gases." Australian Journal of Chemistry 57, no. 8 (2004): 713. http://dx.doi.org/10.1071/ch04102.
Full textMurtadza, Siti Afiqah ‘Aisyah, Junaidah Jai, Nurul Asyikin Md Zaki, and Fazlena Hamzah. "Essential oils encapsulation performance evaluation: A review on encapsulation parameters." Malaysian Journal of Chemical Engineering and Technology (MJCET) 4, no. 2 (October 31, 2021): 114. http://dx.doi.org/10.24191/mjcet.v4i2.14481.
Full textGuo, Ya Bei, Hui Yu, Wen Yi Lu, Xiao Feng Jin, and Jiang Bo Zou. "The Influence and Control of Encapsulation Moisture in MEMS Gyroscope." Key Engineering Materials 609-610 (April 2014): 875–78. http://dx.doi.org/10.4028/www.scientific.net/kem.609-610.875.
Full textKim, Taehoon, Wonbin Kim, Daehee Seo, and Imyeong Lee. "Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments." Sensors 21, no. 10 (May 17, 2021): 3474. http://dx.doi.org/10.3390/s21103474.
Full textVlasenko, A. V., M. V. Evsyukov, M. M. Putyato, and A. S. Makaryan. "RESEARCH OF KEY ENCAPSULATION MECHANISMS BASED ON POSTQUANTUM CRYPTOGRAPHIC ALGORITHMS." CASPIAN JOURNAL: Control and High Technologies 48, no. 4 (2019): 121–27. http://dx.doi.org/10.21672/2074-1707.2019.48.4.121-127.
Full textJalali, Amir, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, and David Jao. "ARMv8 SIKE: Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors." IEEE Transactions on Circuits and Systems I: Regular Papers 66, no. 11 (November 2019): 4209–18. http://dx.doi.org/10.1109/tcsi.2019.2920869.
Full textPark, So Hyun, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park. "Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials." IEEE Access 8 (2020): 112585–97. http://dx.doi.org/10.1109/access.2020.3002223.
Full textPhoon, Jun-Hoe, Wai-Kong Lee, Denis C. K. Wong, Wun-She Yap, Bok-Min Goi, and Raphael C. W. Phan. "Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism." IEEE Internet of Things Journal 7, no. 9 (September 2020): 8513–24. http://dx.doi.org/10.1109/jiot.2020.2991334.
Full textLong, Yu, Xiang-xue Li, Ke-fei Chen, and Xuan Hong. "Distributed certificateless key encapsulation mechanism secure against the adaptive adversary." Journal of Shanghai Jiaotong University (Science) 14, no. 1 (February 2009): 102–6. http://dx.doi.org/10.1007/s12204-009-0102-7.
Full textChoi, Seung Geol, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, and Moti Yung. "The Kurosawa–Desmedt key encapsulation is not chosen-ciphertext secure." Information Processing Letters 109, no. 16 (July 2009): 897–901. http://dx.doi.org/10.1016/j.ipl.2009.04.007.
Full textXu, Shengfeng, and Xiangxue Li. "Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model." IEEE Access 9 (2021): 13683–90. http://dx.doi.org/10.1109/access.2021.3051047.
Full textGiraldo, Kevin A., Juan Sebastian Bermudez, Carlos E. Torres, Luis H. Reyes, Johann F. Osma, and Juan C. Cruz. "Microfluidics for Multiphase Mixing and Liposomal Encapsulation of Nanobioconjugates: Passive vs. Acoustic Systems." Fluids 6, no. 9 (August 31, 2021): 309. http://dx.doi.org/10.3390/fluids6090309.
Full textVillanueva-Polanco, Ricardo, and Eduardo Angulo-Madrid. "Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism." Applied Sciences 11, no. 1 (December 28, 2020): 193. http://dx.doi.org/10.3390/app11010193.
Full textMontané, Xavier, Anna Bajek, Krzysztof Roszkowski, Josep M. Montornés, Marta Giamberini, Szymon Roszkowski, Oliwia Kowalczyk, Ricard Garcia-Valls, and Bartosz Tylkowski. "Encapsulation for Cancer Therapy." Molecules 25, no. 7 (March 31, 2020): 1605. http://dx.doi.org/10.3390/molecules25071605.
Full textVlasenko, A., M. Evsyukov, M. Putyato, and A. Makaryan. "Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 1. Decision Making Algorithm." Proceedings of Telecommunication Universities 6, no. 4 (December 2020): 70–79. http://dx.doi.org/10.31854/1813-324x-2020-6-4-70-79.
Full textPARK, Jong Hwan, and Dong Hoon LEE. "Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 329–31. http://dx.doi.org/10.1587/transfun.e92.a.329.
Full textKiltz, Eike, and David Galindo. "Direct chosen-ciphertext secure identity-based key encapsulation without random oracles." Theoretical Computer Science 410, no. 47-49 (November 2009): 5093–111. http://dx.doi.org/10.1016/j.tcs.2009.08.007.
Full textYang, Yang. "Efficient identity-based key encapsulation scheme with wildcards for email systems." International Journal of Communication Systems 27, no. 1 (September 30, 2013): 171–83. http://dx.doi.org/10.1002/dac.2672.
Full textPhoon, Jun-Hoe, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, and Bok-Min Goi. "Area–Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, no. 12 (December 2020): 2672–84. http://dx.doi.org/10.1109/tvlsi.2020.3025046.
Full textWu, Jui-Di, Yuh-Min Tseng, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage." IEEE Open Journal of the Computer Society 1 (2020): 131–44. http://dx.doi.org/10.1109/ojcs.2020.3008961.
Full textWei, Puwen, and Yuliang Zheng. "On the Construction of Public Key Encryption with Sender Recovery." International Journal of Foundations of Computer Science 26, no. 01 (January 2015): 1–31. http://dx.doi.org/10.1142/s012905411550001x.
Full text