Добірка наукової літератури з теми "Key encapsulation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Key encapsulation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Key encapsulation"
Yi-Fan Tseng, Yi-Fan Tseng, Zi-Yuan Liu Yi-Fan Tseng, and Raylin Tso Zi-Yuan Liu. "A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism." 網際網路技術學刊 22, no. 5 (September 2021): 1183–95. http://dx.doi.org/10.53106/160792642021092205020.
Повний текст джерелаANADA, Hiroaki, and Seiko ARITA. "Identification Schemes from Key Encapsulation Mechanisms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95.A, no. 7 (2012): 1136–55. http://dx.doi.org/10.1587/transfun.e95.a.1136.
Повний текст джерелаWu, Jui-Di, Yuh-Min Tseng, Sen-Shan Huang, and Wei-Chieh Chou. "Leakage-Resilient Certificateless Key Encapsulation Scheme." Informatica 29, no. 1 (January 1, 2018): 125–55. http://dx.doi.org/10.15388/informatica.2018.161.
Повний текст джерелаPope, Emily, Bradley Haltli, Russell G. Kerr, and Ali Ahmadi. "Effects of Matrix Composition and Temperature on Viability and Metabolic Activity of Microencapsulated Marine Bacteria." Microorganisms 10, no. 5 (May 10, 2022): 996. http://dx.doi.org/10.3390/microorganisms10050996.
Повний текст джерелаMuhammad Fuad Al Khafiz, Yuanita Hikmahwati, Khairul Anam, and Dwi Hudiyanti. "Key conditions of alpha-tocopherol encapsulation in gum Arabic dispersions." International Journal of Research in Pharmaceutical Sciences 10, no. 4 (October 16, 2019): 2622–27. http://dx.doi.org/10.26452/ijrps.v10i4.1520.
Повний текст джерелаLI, Ji-Guo, Hai-Shan YANG, and Yi-Chen ZHANG. "Certificate-Based Key Encapsulation Mechanism with Tags." Journal of Software 23, no. 8 (September 11, 2012): 2163–72. http://dx.doi.org/10.3724/sp.j.1001.2012.04127.
Повний текст джерелаHANAOKA, Goichiro, Takahiro MATSUDA, and Jacob C. N. SCHULDT. "A New Combiner for Key Encapsulation Mechanisms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 12 (December 1, 2019): 1668–75. http://dx.doi.org/10.1587/transfun.e102.a.1668.
Повний текст джерелаBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, et al. "DAGS: Key encapsulation using dyadic GS codes." Journal of Mathematical Cryptology 12, no. 4 (December 1, 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Повний текст джерелаManulis, Mark, Bertram Poettering, and Douglas Stebila. "Plaintext awareness in identity-based key encapsulation." International Journal of Information Security 13, no. 1 (November 22, 2013): 25–49. http://dx.doi.org/10.1007/s10207-013-0218-5.
Повний текст джерелаQin, Baodong, Shengli Liu, Shifeng Sun, Robert H. Deng, and Dawu Gu. "Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman." Information Sciences 406-407 (September 2017): 1–11. http://dx.doi.org/10.1016/j.ins.2017.04.018.
Повний текст джерелаДисертації з теми "Key encapsulation"
Gustafsson, Alex, and Carl Stensson. "The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21849.
Повний текст джерелаBakgrund. Människor använder internet för bland annat kommunikation, arbete och bankärenden. Asymmetrisk kryptering möjliggör att detta sker säkert genom att erbjuda sekretess och tillit online. Även om dessa algoritmer förväntas vara säkra från attacker med klassiska datorer, riskerar framtida kvantdatorer att knäcka dem med Shors algoritm. Därför utvecklas kvantsäkra krypton för att mitigera detta problem. National Institute of Standards and Technology (NIST) har påbörjat en standardiseringsprocess för dessa algoritmer. Syfte. I detta arbete analyserar vi vilka specialiserade funktioner för kvantsäkra algoritmer som finns i stordator-arkitekturen IBM Z. Vidare studerar vi prestandan av dessa algoritmer på olika hårdvara för att förstå vilka tekniker som kan öka deras prestanda. Metod. Vi utför en litteraturstudie för att identifiera vad som är karaktäristiskt för kvantsäkra algoritmers prestanda samt vilka funktioner i IBM Z som kan möta och accelerera dessa. Vidare applicerar vi en experimentell studie för att analysera den praktiska prestandan av de två framträdande finalisterna NTRU och Classic McEliece på konsument-, moln- och stordatormiljöer. Resultat. Vi fann att IBM Z kunde accelerera flera centrala symmetriska primitiver så som SHA-3 och AES via en hjälpprocessor för kryptografiska funktioner (CPACF). Även om befintliga hårdvarusäkerhetsmoduler inte stödde några av de undersökta algoritmerna, fann vi att de kan accelerera dem via en på-plats-programmerbar grind-matris (FPGA). Baserat på vår experimentella studie, fann vi att datorer med stöd för avancerade vektorfunktioner (AVX) möjlggjorde en signifikant acceleration av kvantsäkra algoritmer. Slutligen identifierade vi att vektorfunktioner, applikationsspecifika integrerade kretsar (ASICs) och FPGAs är centrala tekniker som kan nyttjas för att accelerera dessa algortmer. Slutsatser. Gällande beredskapen hos hårdvara för en övergång till kvantsäkra krypton, finner vi att de föreslagna algoritmerna inte presterar närmelsevis lika bra som klassiska algoritmer. Trots att det är sannolikt att de kvantsäkra kryptona fortsatt förbättras innan övergången sker, kan förbättrat hårdvarustöd för snabbare vektorfunktioner, ökade cachestorlekar och tillägget av polynomoperationer signifikant bidra till att minska påverkan av övergången till kvantsäkra krypton.
Талмач, Дмитро Павлович. "Детерміновані методи відображення повідомлення в точку еліптичної кривої, заданої у різних формах". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44276.
Повний текст джерелаThe work is devoted to constructing deterministic polynomial algorithm for encoding sequences of bits into points of Elliptic Curves represented in different forms. The work presents basic information related to the topic of Elliptic Curves, especially in the Edwards form, that is necessary for understanding further mathematical calculations. Next, the problem of encoding underlying field elements, over which the curve is defined, into points of the curve for using this encoding in cryptographic protocols, which are based on hashing or key encapsulation schemes, is considered in more detail. In the last section new algorithms are presented and compared.
Chou, Wei-Chieh, and 周緯傑. "Leakage-Resilient Certificateless Key Encapsulation Scheme." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/uhjbfd.
Повний текст джерела國立彰化師範大學
數學系
105
The previous adversary models of public key cryptography usually have a nature assumption that permanent/temporary secret (private) keys must be kept safely and other internal states are not leaked to an adversary. However, in practice, it is difficult to keep away from all possible kinds of leakage on these secret data due to a new kind of threat, called “side-channel attacks”. By side-channel attacks, the adversary could obtain some partial information of these secret data so that some existing adversary models could be insufficient. Indeed, the study of leakage-resilient cryptography resistant to side-channel attacks has received significant attention recently. Up to date, no work has been done on the design of leakage-resilient certificateless key encapsulation encryption (LR-CL-KE) schemes under the continual leakage model. In this article, we propose the first LR-CL-KE scheme under the continual leakage model. In the generic bilinear group (GBG) model, we formally prove that our LR-CL-KE scheme is semantically secure against adaptive chosen ciphertext attacks for both Type I and Type II adversaries.
Wu, Ming-Shiun, and 吳明勳. "An Efficient Encapsulating Scheme for the Rekey Message in Group Key Management." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/01442934983501957931.
Повний текст джерела逢甲大學
資訊工程所
94
With the developing and thriving of the Internet, business applications applied on the Internet are getting more and more popular. The most common applications we have seen nowadays are CDS(Content Distribution Services), VoIP, Net Meeting, Online Game, and etc. In these applications, group members need to ensure the privacy and integrity of messages depending on the cryptographic keys. However, it is a difficult problem to efficiently manage cryptographic keys for a large, dynamically changing group. The major problem of GKM is we need a large number of message transmissions to refresh group key whenever a member is added to or evicted from the group. Many GKM schemes paid their attentions on the way to generate cryptographic keys, none of these paid their attentions at the discussion of changing transmission way to decrease the message transmission times. Futhermore, in the article RFC2627 , Wallner et. al. mentioned: “It is also possible to transmit all of the intermediate node keys and root node key in one message”. Therefore, in this paper, we made experiments in GKM rekeying simulation. In the experiment results, we found that to send rekey messages in batch is more efficient than to send them one-by-one. According to the experiment results, we also proposed a novel encapsulating scheme to apply to GKM rekeying mechanism. In our scheme, it not only decreases the total transmission length and time greatly, but also group members only need to spend a little calculation to get their rekey messages, and no member has a way to get the other member’s messages using collusion attacks or any other decryption attacks.
Книги з теми "Key encapsulation"
Busse, Beatrix. Speech, Writing, and Thought Presentation in 19th-Century Narrative Fiction. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190212360.001.0001.
Повний текст джерелаЧастини книг з теми "Key encapsulation"
Bindel, Nina, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, and Douglas Stebila. "Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange." In Post-Quantum Cryptography, 206–26. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25510-7_12.
Повний текст джерелаCoretti, Sandro, Ueli Maurer, and Björn Tackmann. "A Constructive Perspective on Key Encapsulation." In Lecture Notes in Computer Science, 226–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-42001-6_16.
Повний текст джерелаBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, et al. "DAGS: Reloaded Revisiting Dyadic Key Encapsulation." In Code-Based Cryptography, 69–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25922-8_4.
Повний текст джерелаLv, Liqun, Wenjun Sun, Xiaoyuan Yang, and Xuan Wang. "Key Encapsulation Mechanism from Multilinear Maps." In Advances in Internetworking, Data & Web Technologies, 349–57. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59463-7_35.
Повний текст джерелаSmart, N. P. "Efficient Key Encapsulation to Multiple Parties." In Security in Communication Networks, 208–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30598-9_15.
Повний текст джерелаAnada, Hiroaki, and Seiko Arita. "Identification Schemes from Key Encapsulation Mechanisms." In Lecture Notes in Computer Science, 59–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21969-6_4.
Повний текст джерелаKurosawa, Kaoru, and Le Trieu Phong. "Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited." In Progress in Cryptology – AFRICACRYPT 2014, 51–68. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06734-6_4.
Повний текст джерелаStam, Martijn. "A Key Encapsulation Mechanism for NTRU." In Cryptography and Coding, 410–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11586821_27.
Повний текст джерелаHülsing, Andreas, Joost Rijneveld, John Schanck, and Peter Schwabe. "High-Speed Key Encapsulation from NTRU." In Lecture Notes in Computer Science, 232–52. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66787-4_12.
Повний текст джерелаXue, Haiyang, Xianhui Lu, Bao Li, Bei Liang, and Jingnan He. "Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism." In Lecture Notes in Computer Science, 158–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03329-3_6.
Повний текст джерелаТези доповідей конференцій з теми "Key encapsulation"
Matsuda, Takahiro, and Jacob C. N. Schuldt. "A New Key Encapsulation Combiner." In 2018 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2018. http://dx.doi.org/10.23919/isita.2018.8664317.
Повний текст джерелаYesina, Maryna, Mikolaj Karpinski, Volodymyr Ponomar, Yurij Gorbenko, Tomasz Gancarczyk, and Uliana Iatsykovska. "Comparative Analysis of Key Encapsulation Mechanisms." In 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2019. http://dx.doi.org/10.1109/idaacs.2019.8924373.
Повний текст джерелаLiu, Zhen, and Xiao Yuan Yang. "Public Verifiable Key Encapsulation Mechanism under Factoring." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.108.
Повний текст джерелаWang, Changji, Yang Liu, and Jung-Tae Kim. "An IND-CCA2 Secure Key-Policy Attribute Based Key Encapsulation Scheme." In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.128.
Повний текст джерелаChow, Sherman S. M., Joseph K. Liu, and Jianying Zhou. "Identity-based online/offline key encapsulation and encryption." In the 6th ACM Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1966913.1966922.
Повний текст джерелаXin Lai, Xiaofang Huang, and Dake He. "An ID-based efficient signcryption key encapsulation scheme." In 2008 International Symposium on Biometrics and Security Technologies (ISBAST). IEEE, 2008. http://dx.doi.org/10.1109/isbast.2008.4547635.
Повний текст джерелаCai, Yang, Qiuliang Xu, and Zhihua Zheng. "A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme." In 2012 Eighth International Conference on Computational Intelligence and Security (CIS). IEEE, 2012. http://dx.doi.org/10.1109/cis.2012.147.
Повний текст джерелаKuznetsov, Alexandr, Maria Lutsenko, Nastya Kiian, Tymur Makushenko, and Tetiana Kuznetsova. "Code-based key encapsulation mechanisms for post-quantum standardization." In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409144.
Повний текст джерелаGong, Borui, Man Ho Au, and Haiyang Xue. "Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms." In 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019. http://dx.doi.org/10.1109/trustcom/bigdatase.2019.00084.
Повний текст джерела"SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001408002540261.
Повний текст джерелаЗвіти організацій з теми "Key encapsulation"
Yegani, P., K. Leung, A. Lior, K. Chowdhury, and J. Navali. Generic Routing Encapsulation (GRE) Key Extension for Mobile IPv4. RFC Editor, May 2011. http://dx.doi.org/10.17487/rfc6245.
Повний текст джерелаMuhanna, A., M. Khalil, S. Gundavelli, and K. Leung. Generic Routing Encapsulation (GRE) Key Option for Proxy Mobile IPv6. RFC Editor, June 2010. http://dx.doi.org/10.17487/rfc5845.
Повний текст джерелаSmyslov, V. Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols. RFC Editor, March 2022. http://dx.doi.org/10.17487/rfc9227.
Повний текст джерелаApplication for Approval of Modification for the 105-KE Basin Encapsulation Activity. Office of Scientific and Technical Information (OSTI), March 1993. http://dx.doi.org/10.2172/10148716.
Повний текст джерела