Open AccessDissertation
Efficient Key Management for Data Security using TDES
Gaurav Puri,Ajay Kakkar +1 more
Reads0
Chats0
About:
The article was published on 2015-07-28 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Encryption & Encryption software.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal Article
An Efficient Certificate less Encryption for Secure Data Sharing In Public Clouds
TL;DR: The study proposes a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds and proposes an extension to the above approach to improve the efficiency of encryption at the data owner.
References
More filters
Journal ArticleDOI
Linkable Ring Signature with Unconditional Anonymity
TL;DR: This paper is the first to solve the open problem of an unconditional anonymous linkable ring signature scheme with unconditional anonymity by giving a concrete instantiation, which is proven secure in the random oracle model.
Posted Content
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Huiqi Xu,Shumin Guo,Keke Chen +2 more
TL;DR: Wang et al. as mentioned in this paper proposed the RASP data perturbation method, which combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries.
Journal ArticleDOI
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Huiqi Xu,Shumin Guo,Keke Chen +2 more
TL;DR: The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries.
Journal ArticleDOI
Measurement-Device-Independent Quantum Cryptography
TL;DR: A novel approach to quantum key distribution, called measurement-device-independent QKD (mdiQKD), has been proposed, which can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKKD systems, thus offering a clear avenue toward secure QkD realisations.
Journal ArticleDOI
Single- and Multi-core Configurable AES Architectures for Flexible Security
TL;DR: The architecture performs encryption and decryption of large data with 128-b key in CBC mode using on-the-fly key generation and composite field S-box, making it more cost effective (with better thousand-gate/gigabit-per-second ratio) than conventional methods.