Privacy-preserving record linkage for big data: Current approaches and research challenges

D Vatsalan, Z Sehili, P Christen, E Rahm - Handbook of big data …, 2017 - Springer
Abstract The growth of Big Data, especially personal data dispersed in multiple data
sources, presents enormous opportunities and insights for businesses to explore and …

CEASER: Mitigating conflict-based cache attacks via encrypted-address and remap**

MK Qureshi - 2018 51st Annual IEEE/ACM International …, 2018 - ieeexplore.ieee.org
Modern processors share the last-level cache between all the cores to efficiently utilize the
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

L Grassi, Y Hao, C Rechberger, M Schofnegger… - Annual International …, 2023 - Springer
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …

Structural evaluation by generalized integral property

Y Todo - Annual International Conference on the Theory and …, 2015 - Springer
In this paper, we show structural cryptanalyses against two popular networks, ie, the Feistel
Network and the Substitute-Permutation Network (SPN). Our cryptanalyses are …

A survey of confidential data storage and deletion methods

SM Diesburg, AIA Wang - ACM Computing Surveys (CSUR), 2010 - dl.acm.org
As the amount of digital data grows, so does the theft of sensitive data through the loss or
misplacement of laptops, thumb drives, external hard drives, and other electronic storage …

[BUCH][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[BUCH][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Random oracles are practical: A paradigm for designing efficient protocols

M Bellare, P Rogaway - Proceedings of the 1st ACM Conference on …, 1993 - dl.acm.org
We argue that the random oracle model—where all parties have access to a public random
oracle—provides a bridge between cryptographic theory and cryptographic practice. In the …

[BUCH][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[BUCH][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …