搜索结果: 1-15 共查到“军事学 Comparison”相关记录41条 . 查询时间(0.17 秒)
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
AES DPA multi-bit DPA
2019/8/8
Side channel attacks have demonstrated in the past that it is possible to break cryptographic algorithms by attacking the implementation rather than the algorithm. This paper compares an adaptation of...
Improved Secure Integer Comparison via Homomorphic Encryption
secure comparison homomorphic encryption
2019/4/28
Secure integer comparison has been one of the first problems introduced in cryptography, both for its simplicity to describe and for its applications. The first formulation of the problem was to enabl...
Numerical Methods for Comparison on Homomorphically Encrypted Numbers
Homomorphic Encryption Comparison Min/Max
2019/4/25
We propose a new method to compare numbers which are encrypted by Homomorphic Encryption (HE). Previously, comparison and min/max functions were evaluated using Boolean functions where input numbers a...
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
private queries encrypted database homomorphic encryption
2019/4/3
To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, ``x=y,x≠yx=y,x≠y'', have been widely studied with many proposals but ...
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
multiparty computation secret sharing secure comparison
2019/1/2
In 1994, Feige, Kilian, and Naor proposed a simple protocol for secure 33-way comparison of integers aa and bb from the range [0,2][0,2]. Their observation is that for p=7p=7, the Legendre symbol (x|p...
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on NTRU.
At the IEEE Workshop on Information Forensics and Security in 2012, Veugen introduced two ways of improving a well-known secure comparison protocol by Damgård, Geisler and Krøigaard, which u...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
various contexts implementation constraints
2018/4/4
In this paper, we optimize the performances and compare several recent masking schemes in bitslice on 32-bit arm devices, with a focus on multiplication. Our main conclusion is that efficiency (or ran...
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
cryptographic protocols secure comparison
2018/3/6
Within recent years, secure comparison protocols have been proposed using binary decomposition and properties of algebraic fields. These have been repeatedly optimized and increased in efficiency, but...
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
RLWE Post Quantum Key Exchange
2017/12/11
Error reconciliation is an important technique for Learning With Error (LWE) and Ring-LWE (RLWE)-based constructions. In this paper, we present a comparison analysis on two error reconciliation-based ...
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication
Secure sketches typo-tolerant password authentication
2017/6/9
Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We re...
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
post-quantum cryptography hash based signatures hbs
2017/4/27
Quantum computing poses challenges to public key signature schemes as we know them today. LMS and XMSS are two hash based signature schemes that have been proposed in the IETF as quantum secure. Both ...
Access Control Encryption for Equality, Comparison, and More
Access Control Encryption pairings predicates
2017/2/20
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to \emph{read} but also what they are allowed to \emph{write}.
Comparison between Subfield and Straightforward Attacks on NTRU
cryptanalysis lattice techniques,number theory post quantum cryptography
2016/7/22
Recently in two independent papers, Albrecht, Bai and Ducas and Cheon, Jeong and Lee presented two very similar attacks, that allow to break NTRU with larger parameters and GGH Multinear Map without z...