Implementing the Honey Encryption for Securing Public Cloud Data Storage
暂无分享,去创建一个
[1] Santanu Sarkar,et al. Cryptanalysis of an RSA variant with moduli N=prql , 2017, J. Math. Cryptol..
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Jiqiang Lu,et al. Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits , 2011, ISPEC.
[4] Thomas Ristenpart,et al. Honey Encryption: Encryption beyond the Brute-Force Barrier , 2014, IEEE Security & Privacy.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Zhicong Huang,et al. GenoGuard: Protecting Genomic Data against Brute-Force Attacks , 2015, 2015 IEEE Symposium on Security and Privacy.
[7] Azman Samsudin,et al. Lattice Ciphertext-Policy Attribute-Based encryption from ring-LWE , 2015, 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET).
[8] Azman Samsudin,et al. A Survey of Homomorphic Encryption for Outsourced Big Data Computation , 2016, KSII Trans. Internet Inf. Syst..
[9] Thomas Ristenpart,et al. Honey Encryption: Security Beyond the Brute-Force Bound , 2014, IACR Cryptol. ePrint Arch..