The RSA (Rivest–Shamir–Adleman) cryptosystem is a widely used public-key cryptographic algorithm in information systems and computer applications. With the advancement of lattice theory, a technique known as the lattice-based method has emerged as a significant threat to RSA and its variants. This...
defsha2_rsa_encrypt(password,salt,public_key):message=_xor_password(password+b"\0",salt)rsa_key=serialization.load_pem_public_key(public_key,default_backend())returnrsa_key.encrypt(message,padding.OAEP(mgf=padding.MGF1(algorithm=hashes.SHA1()),algorithm=hashes.SHA1(),label=None,),)defnat...
This work proposed a telemedicine data secure-sharing scheme based on heterogeneous federated learning. In this scheme, we designed a novel heterogeneous federated learning framework with model alignment suitable for resource-constrained environments. The parameter server implements the global aggregation algo...
The 128-bit blocks used by the AES method are encrypted and decrypted using the same keys. Depending on the specified encryption key size of 128 bits, 192 bits, or 256 bits, respectively, the AES algorithm processes data in 128 bit blocks and performs 10, 12, or 14 rounds of functions....
RSA encryption algorithm in MEGA, such as RSA key recovery attack, framing attack, integrity attack, etc., to destroy the user data integrity to some extent. Through the RSA key recovery attack, the attacker can recover the RSA private key after 1023 client login attempts, while using quantum...
RSA, AES/RC4/3DES, SHA/MD5 Server and/or client operation, Supports TLS 1.0, 1.1, 1.2, 1.3 and SSL 3.0, Supports DTLS 1.0 and DTLS 1.2, Robust and efficient implementation, Supports ECC (Elliptic Curve Cryptography), Rich set of TLS cipher suites (including Suite B profile), RSA, ...
along with the conceptualization of a specific fraud schema as an algorithm that can be executed by an agent in a simulated cryptocurrency market. Note that this approach opens the door to a broader view on the role of the fraudulent trader in the Bitcoin market, thus allowing to analyze the...
Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database s
A direct application is to verify the integrity of data in a homomorphic sense. The earliest evaluation of hash function can be traced back to Mella and Susella (2013), who presented a homomorphic evaluation of the SHA-256 hash algorithm based on the BGV scheme. However, the main challenge...
There has been an increasing amount of literatures on traversal algorithm of hash-based signature, such as tree traversal algorithm and hash chain traversal algorithm, which allows for optimal trade-off between signature time and storage cost. In terms of tree traversal algorithm, two different appro...