scispace - formally typeset
Open AccessDissertation

Efficient Key Management for Data Security using TDES

Gaurav Puri, +1 more
Reads0
Chats0
About
The article was published on 2015-07-28 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Encryption & Encryption software.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal Article

An Efficient Certificate less Encryption for Secure Data Sharing In Public Clouds

TL;DR: The study proposes a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds and proposes an extension to the above approach to improve the efficiency of encryption at the data owner.
References
More filters
Journal ArticleDOI

Linkable Ring Signature with Unconditional Anonymity

TL;DR: This paper is the first to solve the open problem of an unconditional anonymous linkable ring signature scheme with unconditional anonymity by giving a concrete instantiation, which is proven secure in the random oracle model.
Posted Content

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

TL;DR: Wang et al. as mentioned in this paper proposed the RASP data perturbation method, which combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries.
Journal ArticleDOI

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

TL;DR: The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries.
Journal ArticleDOI

Measurement-Device-Independent Quantum Cryptography

TL;DR: A novel approach to quantum key distribution, called measurement-device-independent QKD (mdiQKD), has been proposed, which can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKKD systems, thus offering a clear avenue toward secure QkD realisations.
Journal ArticleDOI

Single- and Multi-core Configurable AES Architectures for Flexible Security

TL;DR: The architecture performs encryption and decryption of large data with 128-b key in CBC mode using on-the-fly key generation and composite field S-box, making it more cost effective (with better thousand-gate/gigabit-per-second ratio) than conventional methods.
Related Papers (5)