An identity-based online/offline encryption (IBOOE) scheme splits the encryption process into two phases. The first phase performs most of the heavy computations, such as modular exponentiation or pairing over points on elliptic curve. The knowledge of the plaintext or the receiver's identity is not
โฆ LIBER โฆ
[ACM Press the 6th ACM Symposium - Hong Kong, China (2011.03.22-2011.03.24)] Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11 - Identity-based online/offline key encapsulation and encryption
โ Scribed by Chow, Sherman S. M.; Liu, Joseph K.; Zhou, Jianying
- Book ID
- 121291382
- Publisher
- ACM Press
- Year
- 2011
- Weight
- 154 KB
- Category
- Article
- ISBN
- 1450305644
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
[ACM Press the 6th ACM Symposium - Hong
โ
Chow, Sherman S. M.; Liu, Joseph K.; Zhou, Jianying
๐
Article
๐
2011
๐
ACM Press
โ 154 KB
[ACM Press the 6th ACM Symposium - Hong
โ
Bletsch, Tyler; Jiang, Xuxian; Freeh, Vince W.; Liang, Zhenkai
๐
Article
๐
2011
๐
ACM Press
โ 245 KB
[ACM Press the 6th ACM Symposium - Hong
โ
Bletsch, Tyler; Jiang, Xuxian; Freeh, Vince W.; Liang, Zhenkai
๐
Article
๐
2011
๐
ACM Press
โ 245 KB
Return-oriented programming is an effective code-reuse attack in which short code sequences ending in a ret instruction are found within existing binaries and executed in arbitrary order by taking control of the stack. This allows for Turing-complete behavior in the target program without the need f
[ACM Press the 6th ACM Symposium - Hong
โ
Li, Jin; Huang, Qiong; Chen, Xiaofeng; Chow, Sherman S. M.; Wong, Duncan S.; Xie
๐
Article
๐
2011
๐
ACM Press
โ 114 KB
[ACM Press the 6th ACM Symposium - Hong
โ
Jorgensen, Zach; Yu, Ting
๐
Article
๐
2011
๐
ACM Press
โ 105 KB
[ACM Press the 2nd ACM symposium - Singa
โ
Baek, Joonsang; Susilo, Willy; Zhou, Jianying
๐
Article
๐
2007
๐
ACM Press
๐
English
โ 246 KB