Privacy-preserving record linkage for big data: Current approaches and research challenges
Abstract The growth of Big Data, especially personal data dispersed in multiple data
sources, presents enormous opportunities and insights for businesses to explore and …
sources, presents enormous opportunities and insights for businesses to explore and …
CEASER: Mitigating conflict-based cache attacks via encrypted-address and remap**
MK Qureshi - 2018 51st Annual IEEE/ACM International …, 2018 - ieeexplore.ieee.org
Modern processors share the last-level cache between all the cores to efficiently utilize the
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …
and recently gained in popularity due to novel proof systems. For many of these …
Structural evaluation by generalized integral property
Y Todo - Annual International Conference on the Theory and …, 2015 - Springer
In this paper, we show structural cryptanalyses against two popular networks, ie, the Feistel
Network and the Substitute-Permutation Network (SPN). Our cryptanalyses are …
Network and the Substitute-Permutation Network (SPN). Our cryptanalyses are …
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or
misplacement of laptops, thumb drives, external hard drives, and other electronic storage …
misplacement of laptops, thumb drives, external hard drives, and other electronic storage …
[BUCH][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[BUCH][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Random oracles are practical: A paradigm for designing efficient protocols
We argue that the random oracle model—where all parties have access to a public random
oracle—provides a bridge between cryptographic theory and cryptographic practice. In the …
oracle—provides a bridge between cryptographic theory and cryptographic practice. In the …
[BUCH][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
[BUCH][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …