Advanced search in Research products
Research products
arrow_drop_down
Searching FieldsTerms
Author ORCID
arrow_drop_down
is
arrow_drop_down

Filters

  • Access
  • Type
  • Year range
  • Field of Science
  • Country
  • Source
  • Research community
  • Organization
The following results are related to Energy Research. Are you interested to view more results? Visit OpenAIRE - Explore.
1 Research products
Relevance
arrow_drop_down
unfold_lessCompact results

  • Energy Research

  • Authors: Revati Raman Dewangan; Sunita Soni; Ashish Mishal;

    Introduction: Cloud computing has revolutionized how individuals and businesses engage with data and software, turning the internet into a powerful computing platform by centralizing resources. Despite its benefits, there's a challenge in safeguarding sensitive information stored externally. Cryptography faces threats, particularly chosen-ciphertext attacks aiming for secret keys or system information. While more common in public-key encryption, these attacks are less frequent in symmetrically coded systems. Security efforts include validating system resilience and continuous improvement, which are vital in countering evolving threats like adaptive chosen ciphertext attacks. Methods: In the evaluation model, stringent measures emphasize robust encryption for system security. Despite the planning, no ciphertext attack guarantees success, necessitating adaptive security protocols. Adaptive attacks like CCA2 expose vulnerabilities, enabling attackers to manipulate ciphertexts persistently. Results: We observe an average gain of 65% for the decryption algorithm. Efforts focus on strengthening security. The flawed 32-bit key-based encryption in the modified Cramer-Shoup structure undergoes remediation. Conclusion: Conventional uncertainties validate resilience, emphasizing continuous evaluation and enhancement to counter evolving threats.

    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    1
    citations1
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
Powered by OpenAIRE graph
Advanced search in Research products
Research products
arrow_drop_down
Searching FieldsTerms
Author ORCID
arrow_drop_down
is
arrow_drop_down
The following results are related to Energy Research. Are you interested to view more results? Visit OpenAIRE - Explore.
1 Research products
  • Authors: Revati Raman Dewangan; Sunita Soni; Ashish Mishal;

    Introduction: Cloud computing has revolutionized how individuals and businesses engage with data and software, turning the internet into a powerful computing platform by centralizing resources. Despite its benefits, there's a challenge in safeguarding sensitive information stored externally. Cryptography faces threats, particularly chosen-ciphertext attacks aiming for secret keys or system information. While more common in public-key encryption, these attacks are less frequent in symmetrically coded systems. Security efforts include validating system resilience and continuous improvement, which are vital in countering evolving threats like adaptive chosen ciphertext attacks. Methods: In the evaluation model, stringent measures emphasize robust encryption for system security. Despite the planning, no ciphertext attack guarantees success, necessitating adaptive security protocols. Adaptive attacks like CCA2 expose vulnerabilities, enabling attackers to manipulate ciphertexts persistently. Results: We observe an average gain of 65% for the decryption algorithm. Efforts focus on strengthening security. The flawed 32-bit key-based encryption in the modified Cramer-Shoup structure undergoes remediation. Conclusion: Conventional uncertainties validate resilience, emphasizing continuous evaluation and enhancement to counter evolving threats.

    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    1
    citations1
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
Powered by OpenAIRE graph