搜索结果: 1-5 共查到“军事学 Concrete Security”相关记录5条 . 查询时间(0.076 秒)
Verifying Solutions to LWE with Implications for Concrete Security
lattices learning with errors discrete gaussian sampling
2019/6/21
A key step in Regev's (2009) reduction of the Discrete Gaussian Sampling (DGS) problem to that of solving the Learning With Errors (LWE) problem is a statistical test required for verifying possible s...
On the Concrete Security of Goldreich’s Pseudorandom Generator
Pseudorandom generators Algebraic attacks Guess-and-Determine
2018/12/3
Local pseudorandom generators allow to expand a short random string into a long pseudo-random string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficie...
Concrete Security for Entity Recognition:The Jane Doe Protocol(Full Paper)
Concrete Security Entity Recognition Jane Doe Protocol
2009/6/12
Entity recognition does not ask whether the message is from
some entity X, just whether a message is from the same entity as a previous
message. This turns turns out to be very useful for low-end de...
Simulation without the Artificial Abort:Simplified Proof and Improved Concrete Security for Waters’IBE Scheme
Artificial Abort Simplified Proof Improved Concrete Security Waters’IBE Scheme
2009/6/12
Waters’ variant of the Boneh-Boyen IBE scheme is attractive because of its efficency, appli-
cations, and security attributes, but suffers from a relatively complex proof with poor concrete
security...
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
SCA1 Model cryptosystems secure side-channel attacks
2009/4/3
When implementing cryptosystems on general purpose cryptographic hardware, one takes profit of the
Application Programming Interfaces (APIs) displaced by the hardware to code the required cryptosyste...