搜索结果: 1-11 共查到“军队指挥学 cryptology”相关记录11条 . 查询时间(0.078 秒)
第十三届信息安全与密码学国际会议(The 13th International Conference on Information Security and Cryptology)
第十三届 信息安全与密码学 国际会议
2017/10/24
The 13th China International Conference on Information Security and Cryptology (INSCRYPT 2017) will be held in Xi'an from November 3rd to November 5th, 2017, organized by the State Key Laboratry of In...
CRYPTO 2016 is the 36th International Cryptology Conference. It will be held at the University of California, Santa Barbara (UCSB) from August 14 to 18, 2016. The academic program covers all aspects o...
the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Cryptology Information Security
2016/7/19
Asiacrypt 2016, the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, will be organized by Vietnam Institute for Advanced Study in Mathematics...
Cryptology ePrint Archive: Report 2013/112
Physical Unclonable Functions Machine Learning Cryptanalysis Physical Cryptography
2013/4/18
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a Strong PUF, our ...
Cryptology ePrint Archive: Report 2011/099Can Code Polymorphism Limit Information Leakage?
cryptographic protocols / side channels polymorphism
2011/3/10
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not i...
New Magic Square Problems and Their Applications in Cryptology
magic square unfinished magic square modular arithmetic shuffling permutation authentication
2010/12/22
Magic square is a complex and hard permutation problem of combinatorial mathematics with a long history, previous research work primarily focuses on how to construct some magic squares with special ma...
New logic minimization techniques with applications to cryptology
AES S-box finite field inversion circuit complexity
2009/6/12
A new technique for combinational circuit optimization is described in the
context of S-boxes. The technique is a two-step process. In the first step, the
non-linearity of the circuit { as measured ...
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Cryptology and Physical Security Rights Amplification Master-Keyed Mechanical Locks
2009/4/15
This paper examines mechanical lock security from the perspective of computer science and cryptology.
We focus on new and practical attacks for amplifying rights in mechanical pin tumbler locks. Give...
THE BEST AND WORST OF SUPERSINGULAR ABELIAN VARIETIES IN CRYPTOLOGY
abelian varieties supersingular elliptic curves
2009/4/13
For certain security applications, including identity based encryption
and short signature schemes, it is useful to have abelian varieties with security
parameters that are neither too small nor too...
Journal of Cryptology
Journal of Cryptology
2008/5/14
The Journal of Cryptology is the official journal of the International Association for Cryptologic Research, and provides a forum for publication of original results in all areas of modern information...
The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security(图)
Cryptology Information Security 14th Theory and Application
2008/5/14
December 7 - 11, 2008 Melbourne, Australia
The International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT, is the main annual event organised by Asi...