We advocate schemes based on fixed-key AES as the best route to highly efficient circuit- garbling. We provide such schemes making only one AES call per garbled-gate evaluation …
NA Bakar, S Rosbi, K Uzaki - International Journal of Management …, 2017 - ideas.repec.org
This paper analyses the operation of cryptocurrency system in perspective of Islamic finance. The purpose of this study is to evaluate the cryptocurrency framework whether it is …
Blockchain is a relatively new technology that is already gaining traction in the academic community. A peer-topeer network structure underpins blockchain technology. It is made up …
S Dziembowski, S Faust - International Conference on the Theory and …, 2011 - Springer
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded …
This research aims to discover how classical Muslim scholars named Abu Ubaid and contemporary academics think about the existence and Islamic law regarding digital …
R Kumar - Wireless Personal Communications, 2020 - Springer
Abstract Financial Cryptography and Security Engineering are the significant areas for research, advanced development, education, exploration and also for commercial purposes …
A Siad - 2012 5th International Conference on New …, 2012 - ieeexplore.ieee.org
Public-key Encryption with Keyword Search (PEKS) is a mechanism that allows to search by keywords on encrypted data by generating trapdoors for the desired keywords. One inherent …
M Abdalla, C Chevalier, L Granboulan… - Cryptographers' Track at …, 2011 - Springer
Password-based authenticated group key exchange allows any group of users in possession of a low-entropy secret key to establish a common session key even in the …
Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite increasing efforts to move to supposedly more secure …