搜索结果: 1-15 共查到“军事学 Another Look”相关记录37条 . 查询时间(0.084 秒)
Another Look at Key Randomisation Hypotheses
linear cryptanalysis key randomisation hypotheses
2019/8/26
In the context of linear cryptanalysis of block ciphers, let p0p0 (resp. p1p1) be the probability that a particular linear approximation holds for the right (resp. a wrong) key choice. The standard ri...
Another look at some isogeny hardness assumptions
post-quantum cryptography isogeny-based cryptography cryptanalysis
2019/8/22
The security proofs for isogeny-based undeniable signature schemes have been based primarily on two isogeny hardness assumptions: that the One-Sided Modified SSCDH problem and the One-More SSCDH probl...
Another Look at Byzantine Fault Tolerance
cryptographic protocols Byzantine Fault Tolerance
2019/7/26
We review several solutions for the Byzantine Fault Tolerance (BFT) problem and discuss some aspects that are frequently overlooked by existing literatures. For example, PBFT and HotStuff BFT protocol...
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Lightweight cryptography FPGA Authenticated cipher
2019/7/17
Security in the Internet of Things (IoT) is challenging. The need for lightweight yet robust cryptographic solutions suitable for the IoT calls for improved design and implementation of constructs suc...
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Symmetric-key cryptography differential cryptanalysis lightweight cryptography
2018/7/19
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Another Look at Relay and Distance-based Attacks in Contactless Payments
Contactless Payments EMV-adaptations
2018/5/3
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
public-key cryptography cryptanalysis
2018/3/15
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is app...
Another Look at Success Probability in Linear Cryptanalysis
linear cryptanalysis success probability data complexity
2017/5/8
This work studies the success probability of linear cryptanalysis. Complete expressions for the success probability are obtained using two different approaches, namely the order statistics and the hyp...
High Order Masking of Look-up Tables with Common Shares
Side-channel countermeasure ISW probing model
2017/3/27
Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, b...
Another Look at Tightness II: Practical Issues in Cryptography
tightness complexity leveraging HMAC
2016/4/12
How to deal with large tightness gaps in security proofs is a vexing issue in
cryptography. Even when analyzing protocols that are of practical importance, leading
researchers often fail to treat th...
A Second Look at Fischlin's Transformation
Fischlin抯 transformation leakage tightness random oracle
2016/1/25
Fischlin抯 transformation is an alternative to the standard Fiat-Shamir transform to
turn a certain class of public key identification schemes into digital signatures (in the random
oracle model).
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
side-channel protection FPGA masking
2016/1/3
Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of first-order side-channel protection for cryptographic primitives at the cost of a significant reconfiguration...
PGP-based encryption systems use a network of key servers to share
public keys. These key server operate on an add only basis, thus the
data gives us access to PGP public keys from over 20 years of ...
Another Look at Normal Approximations in Cryptanalysis
block cipher linear cryptanalysis differential cryptanalysis
2015/12/29
Statistical analysis of attacks on symmetric ciphers often require assuming the normal behaviour of a test
statistic. Typically such an assumption is made in an asymptotic sense. In this work, we con...
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
cryptocurrency blockchain mining
2015/12/18
After more than six years from the launch of Bitcoin, it has become evident
that the decentralized transaction ledger functionality implemented
through the blockchain technology can be used not only...