搜索结果: 1-15 共查到“军队指挥学 public-key cryptography”相关记录26条 . 查询时间(0.078 秒)
Homomorphism learning problems and its applications to public-key cryptography
Learning With Errors isogenies non-commutative cryptography
2019/6/19
We present a framework for the study of a learning problem over abstract groups, and introduce a new technique which allows for public-key encryption using generic groups. We proved, however, that in ...
Public-Key Cryptography in the Fine-Grained Setting
Fine-grained Public-Key One-Way-Function
2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
cryptographic protocols cryptographic algorithms
2018/11/19
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorith...
复旦大学计算机科学与技术学院信息安全课件 Public Key Cryptography
复旦大学计算机科学与技术学院 信息安全 课件 Public Key Cryptography
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 Public Key Cryptography。
From Laconic Zero-Knowledge to Public-Key Cryptography
Public Key Cryptography zero knowledge
2018/6/5
Since its inception, public-key encryption (PKE) has been one of the main cornerstones of cryptography. A central goal in cryptographic research is to understand the foundations of public-key encrypti...
New Approach to Practical Leakage-Resilient Public-Key Cryptography
leakage-resilient public-key encryption key exchange protocols
2017/5/25
We present a new approach to construct several leakage-resilient cryptographic primitives, including public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key...
The Complexity of Public-Key Cryptography
Public key encryption assumptions post quantum cryptography
2017/5/2
We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for public-key encryption schemes, and the types of evidence ...
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
public-key encryption signatures related-key attacks
2016/5/30
We revisit the question of constructing public-key encryption and signature schemes with
security in the presence of bounded leakage and tampering memory attacks. For signatures
we obtain the first ...
Using semidirect product of (semi)groups in public key cryptography
public-key cryptography key exchange protocol
2016/4/15
In this survey, we describe a general key exchange protocol
based on semidirect product of (semi)groups (more specifically, on
extensions of (semi)groups by automorphisms), and then focus on practic...
Commutativity, Associativity, and Public Key Cryptography
Diffie-Hellman algorithms Tchebychev Polynomials New Public Key
2016/2/24
In this paper, we will study some possible generalizations of
the famous Diffie-Hellman algorithm. As we will see, at the end, most of
these generalizations will not be secure or will be equivalent ...
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Coppersmith Methods Analytic Combinatorics Cryptanalysis
2016/1/27
The Coppersmith methods is a family of lattice-based techniques to find small integer
roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent
development...
A SAT-based Public Key Cryptography Scheme
Public key cryptosystems Cryptographic protocols Data Encryption
2015/12/24
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT
formula satisfied by the private key. Probabilistic encryption gene...
How is it possible to prevent the sharing of cryptographic functions? This question appears to be fundamentally hard to address since in this setting the owner of the key {\em is} the adversary: she w...
PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS
Multivariate Cryptography Permutation Polynomials Linear Polynomials
2009/6/12
In this paper we propose an efficient multivariate public key cryp-
tosystem based on permutation p-polynomials over finite fields. We first char-
acterize a class of permutation p-polynomials over ...
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Leakage-Resilient Public-Key Cryptography Bounded-Retrieval Model
2009/6/12
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker
can repeatedly and adaptively learn information about the secret key, subject only to the
constrai...