scispace - formally typeset
Open AccessDissertation

Efficient Key Management for Data Security using TDES

Gaurav Puri, +1 more
Reads0
Chats0
About
The article was published on 2015-07-28 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Encryption & Encryption software.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal Article

An Efficient Certificate less Encryption for Secure Data Sharing In Public Clouds

TL;DR: The study proposes a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds and proposes an extension to the above approach to improve the efficiency of encryption at the data owner.
References
More filters
Journal ArticleDOI

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks

TL;DR: This paper proposes a lightweight and secure system for MSNs that employs hash-chain based key updating mechanism and proxy-protected signature technique to achieve efficient secure transmission and fine-grained data access control and extends the system to provide backward secrecy and privacy preservation.
Journal ArticleDOI

Information-Theoretic Approach to Optimal Differential Fault Analysis

TL;DR: A new DFA methodology to achieve the optimal DFA attack by deriving the amount of the leaked information for various fault models from an information-theoretic perspective is discussed.
Journal ArticleDOI

Arbitrary-State Attribute-Based Encryption with Dynamic Membership

TL;DR: An ABE scheme is presented which is the first ABE scheme that aims at dynamic membership management with arbitrary states, not binary states only, for every attribute and keeps high flexibility of the constraints on attributes and makes users be able to dynamically join, leave, and update their attributes.
Journal ArticleDOI

A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA

TL;DR: A low-cost, non-invasive and effective technique to inject transient faults into a general purpose processor through lowering its feeding voltage, and to characterize the effects on the computing system is presented.
Proceedings ArticleDOI

Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing

TL;DR: The proposed cycle accurate information assurance scheme is successfully demonstrated on cryptographic circuits with various complexities from a small-scale DES encryption core to a state-of-the-art AES encryption design prohibiting the leakage of sensitive information caused by hardware Trojans inserted in RTL codes.
Related Papers (5)