메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Security analysis for order preserving encryption schemes

Author keywords

average min entropy; information theory; known plaintext attacks; Order preserving encryption

Indexed keywords

CRITICAL DATA; ENCRYPTED DATA; ENCRYPTION SCHEMES; KNOWN-PLAINTEXT ATTACKS; MIN-ENTROPY; ORDER PRESERVING; SECURITY ANALYSIS; THIRD PARTIES;

EID: 84868578547     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2012.6310814     Document Type: Conference Paper
Times cited : (36)

References (10)
  • 4
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, SIAM Journal on Computing, 2008, 38(1):97-139.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 84868552129 scopus 로고    scopus 로고
    • Tech Report UTDCS-06-10: http://utdallas.edu/-xll052000/OPEproof-TR2.pdf.
    • Liangliang Xiao, I-Ling Yen, Dongdai Lin, Security Analysis for an Order Preserving Encryption Scheme, Tech Report UTDCS-06-10, 2010, http://utdallas.edu/-xll052000/OPEproof-TR1.pdf, revised version: http://utdallas.edu/-xll052000/OPEproof-TR2.pdf.
    • (2010) Security Analysis for An Order Preserving Encryption Scheme
    • Xiao, L.1    Yen, I.-L.2    Lin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.