搜索结果: 1-15 共查到“军事学 Proposal”相关记录24条 . 查询时间(0.112 秒)
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
formal analysis security API computational soundness
2019/5/13
Being the most widely used and comprehensive standard for hardware security modules, cryptographic tokens and smart cards, PKCS#11 has been the subject of academic study for years. PKCS#11 provides a ...
A polynomial attack on a NIST proposal: RankSign, a code-based signature in rank metric
public-key cryptography NIST
2018/4/17
RankSign is a code-based signature scheme proposed to the NIST competition for post-quantum cryptography [AGHRZ17]. It is based on the rank metric and enjoys remarkably small key sizes, about 10KBytes...
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
Blockchain Proposal Helps Verify Mathematical Theorems
2018/3/15
A public blockchain is proposed in an attempt to enable the coin holders to participate in verifying mathematical theorems for public access. Incentives are designed to encourage any party to contribu...
Proposal for Protocol on a Quorum Blockchain with Zero Knowledge
implementation zero knowledge
2017/11/13
In this paper, we present an implementation scheme of an RTGS on Quorum using the Solidity language. It is heavily inspired by the Schnorr signature protocol to verify the identity of the participants...
The polynomials defining the LFSRs of the linux Kernel PRNG are irreducible but not primitive. As a result, the space of numbers generated by these LFSRs does not fill all the space. We propose in thi...
FNR : Arbitrary length small domain block cipher proposal
Feistel Networks Luby Rackoff block ciphers length preserving
2016/1/9
We propose a practical flexible (or arbitrary) length small domain block cipher,
FNR encryption scheme. FNR denotes Flexible Naor and Reingold. It can cipher small
domain data formats like IPv4, Por...
Chaskey: a MAC Algorithm for Microcontrollers– Status Update and Proposal of Chaskey-12 –
Chaskey-12 Message Authentication Code Microcontroller
2015/12/18
The Chaskey MAC algorithm was presented by Mouha et al.
at SAC 2014. It is designed for real-world applications where 128-bit keys
are required, but standard cryptographic algorithms cannot be imple...
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
public-key cryptography
2014/3/6
We propose a general framework to develop fully homomorphic encryption schemes (FHE) without using Gentry's technique. Initially, a private-key cryptosystem is built over $\mathbb{Z}_n$ ($n$ being an ...
An MQ/Code Cryptosystem Proposal
Multivariate quadratic cryptosystem MinRank tensor decomposition post-quantum cryptography code-based
2013/4/18
We describe a new trap-door (and PKC) proposal. The proposal is ``multivariate quadratic'' (relies on the hardness of solving systems of quadratic equations); it is also code-based, and uses the code-...
Attacks On a Double Length Blockcipher-based Hash Proposal
secret-key cryptography / Blockcipher-based hash functions
2012/3/28
In this paper we attack a $2n$-bit double length hash function proposed by Lee et al. This proposal is a blockcipher-based hash function with hash rate $2/3$. The designers claimed that it could achie...
Attacks On a Double Length Blockcipher-based Hash Proposal
secret-key cryptography / Blockcipher-based hash functions
2011/6/8
In this paper we attack a $2n$-bit double length hash function proposed by Lee et al. This proposal is a blockcipher-based hash function with hash rate $2/3$. The designers claimed that it could achie...
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs
secret-key cryptography / identity management key management
2012/3/30
In 2007, the E.U. FP6 SecurIST called for trustworthy international identity management (IdM) that was user-centric. In 2009, the U.S. Department of Homeland Security (DHS) called for trustworthy glob...
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs
identity management key management
2011/1/20
In 2007, the E.U. FP6 SecurIST called for trustworthy international identity management (IdM) that was user-centric. In 2009, the U.S. Department of Homeland Security (DHS) called for trustworthy glob...
Double Ciphertext Mode : A Proposal for Secure Backup
Double Ciphertext Mode Secure Backup
2010/7/14
Security of data stored in bulk storage devices like the hard disk has gained a lot of importance in the current days. Among the variety of paradigms which are available for disk encryption, low level...
This paper presents a efficient proposal for iterating hash function
to prevent the main of generic attacks such as Multicollisions Attack,Second
Preimage Attack and Herding Attack.Based on this pro...