|
|
|
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ...
ver más
|
|
|
|
|
|
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev
Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u...
ver más
|
|
|
|
|
|
La Zakaria, Endah Yuliani and Asmiati Asmiati
Cryptography is the science and study of protecting data in computer and communication systems from unauthorized disclosure and modification. An ordinary difference equation (a map) can be used in encryption?decryption algorithms. In particular, the Arno...
ver más
|
|
|
|
|
|
Gleb Isaev
Pág. 18 - 24
The denition of the propagation criterion of Boolean functions was introduced by Bart Preneel and co-authors. This concept represent a set of vectors, for which the corresponding derivatives of a Boolean function are balanced. I...
ver más
|
|
|
|
|
|
Barry Fagin
Previous work established the set of square-free integers n with at least one factorization ??=??¯??¯
n
=
p
¯
q
¯
for which ??¯
p
¯
and ??¯
q
¯
are valid RSA keys, whether they are prime or composite. These integers are exactly those with the property...
ver más
|
|
|