Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain-aware rollbackable data access control for iot-enabled digital twin
The rapid development of Internet of Things (IoT) enables digital twin (DT) technology to
precisely represent a real product in a virtual space by generating a multitude of IoT data …
precisely represent a real product in a virtual space by generating a multitude of IoT data …
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin - … , Santa Barbara, CA, USA, August 16-20 …, 2015 - Springer
We study how to construct efficient tweakable block ciphers in the Random Permutation
model, where all parties have access to public random permutation oracles. We propose a …
model, where all parties have access to public random permutation oracles. We propose a …
Secure data deduplication with dynamic access control for mobile cloud storage
Data deduplication is of vital importance for mobile cloud computing to cope with the
explosive growth of outsourced mobile data. In order to ensure the privacy of sensitive …
explosive growth of outsourced mobile data. In order to ensure the privacy of sensitive …
Mix&Slice: Efficient access revocation in the cloud
We present an approach to enforce access revocation on resources stored at external cloud
providers. The approach relies on a resource transformation that provides strong mutual …
providers. The approach relies on a resource transformation that provides strong mutual …
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin - Annual International Conference on the Theory and …, 2015 - Springer
Abstract The iterated Even-Mansour cipher is a construction of a block cipher from r public
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …
Performance comparison between deep learning-based and conventional cryptographic distinguishers
While many similarities between Machine Learning and cryptanalysis tasks exists, so far no
major result in cryptanalysis has been reached with the aid of Machine Learning techniques …
major result in cryptanalysis has been reached with the aid of Machine Learning techniques …
XPX: generalized tweakable even-mansour with improved security guarantees
B Mennink - Annual International Cryptology Conference, 2016 - Springer
We present XPX, a tweakable blockcipher based on a single permutation P. On input of a
tweak (t_ 11, t_ 12, t_ 21, t_ 22) ∈ T and a message m, it outputs ciphertext c= P (m …
tweak (t_ 11, t_ 12, t_ 21, t_ 22) ∈ T and a message m, it outputs ciphertext c= P (m …
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: Five rounds are necessary and sufficient
Y Dai, Y Seurin, J Steinberger… - Advances in Cryptology …, 2017 - Springer
We prove that the 5-round iterated Even-Mansour (IEM) construction with a non-idealized
key-schedule (such as the trivial key-schedule, where all round keys are equal) is …
key-schedule (such as the trivial key-schedule, where all round keys are equal) is …
Mix&Slice for efficient access revocation on outsourced data
A complex problem when outsourcing data to the cloud is access control management.
Encryption, by wrap** data with a self-enforcing protection layer, provides access control …
Encryption, by wrap** data with a self-enforcing protection layer, provides access control …
A quantum related-key attack based on the Bernstein–Vazirani algorithm
H **e, L Yang - Quantum Information Processing, 2020 - Springer
Due to the powerful computing capability of quantum computers, cryptographic researchers
have applied quantum algorithms to cryptanalysis and obtained many interesting results in …
have applied quantum algorithms to cryptanalysis and obtained many interesting results in …