Open AccessDissertation
Efficient Key Management for Data Security using TDES
Gaurav Puri,Ajay Kakkar +1 more
Reads0
Chats0
About:
The article was published on 2015-07-28 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Encryption & Encryption software.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal Article
An Efficient Certificate less Encryption for Secure Data Sharing In Public Clouds
TL;DR: The study proposes a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds and proposes an extension to the above approach to improve the efficiency of encryption at the data owner.
References
More filters
Journal ArticleDOI
A Novel and Lightweight System to Secure Wireless Medical Sensor Networks
TL;DR: This paper proposes a lightweight and secure system for MSNs that employs hash-chain based key updating mechanism and proxy-protected signature technique to achieve efficient secure transmission and fine-grained data access control and extends the system to provide backward secrecy and privacy preservation.
Journal ArticleDOI
Information-Theoretic Approach to Optimal Differential Fault Analysis
TL;DR: A new DFA methodology to achieve the optimal DFA attack by deriving the amount of the leaked information for various fault models from an information-theoretic perspective is discussed.
Journal ArticleDOI
Arbitrary-State Attribute-Based Encryption with Dynamic Membership
TL;DR: An ABE scheme is presented which is the first ABE scheme that aims at dynamic membership management with arbitrary states, not binary states only, for every attribute and keeps high flexibility of the constraints on attributes and makes users be able to dynamically join, leave, and update their attributes.
Journal ArticleDOI
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
TL;DR: A low-cost, non-invasive and effective technique to inject transient faults into a general purpose processor through lowering its feeding voltage, and to characterize the effects on the computing system is presented.
Proceedings ArticleDOI
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing
Yier Jin,Bo Yang,Yiorgos Makris +2 more
TL;DR: The proposed cycle accurate information assurance scheme is successfully demonstrated on cryptographic circuits with various complexities from a small-scale DES encryption core to a state-of-the-art AES encryption design prohibiting the leakage of sensitive information caused by hardware Trojans inserted in RTL codes.