搜索结果: 1-15 共查到“军事学 Cyclic”相关记录21条 . 查询时间(0.187 秒)
Structured Module Learning With Errors From Cyclic Algebras
Lattices Public-Key Cryptography Learning With Errors
2019/6/12
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. ...
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
logic encryption SAT-based attack cyclic circuit
2019/1/26
Cyclic logic encryption is newly proposed in the area of hardware security. It introduces feedback cycles into the circuit to defeat existing logic decryption techniques. To ensure that the circuit is...
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
logic encryption SAT-based attack cyclic circuit
2019/1/26
Logic encryption has attracted much attention due to increasing IC design costs and growing number of untrusted foundries. Unreachable states in a design provide a space of flexibility for logic encry...
Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
code-based cryptography post quantum cryptograp elliptic code
2018/12/6
With the fast development of quantum computation, code based cryptography arises public concern as a candidate of post quantum cryptography. However, the large key-size becomes a main drawback such th...
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
cyclic circuit logic encryption circuit obfuscation
2017/12/11
The high cost of IC design has made chip protection one of the first priorities of the semiconductor industry. Although there is a common impression that combinational circuits must be designed withou...
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
hardware security logic encryption SAT
2017/6/28
Cyclic logic encryption is a newly proposed circuit obfuscation technique in hardware security. It was claimed to be SAT-unresolvable because feedback cycles were intentionally inserted under keys int...
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
secret-key cryptography cyclic-additive difference sets
2017/6/8
In the preprint [Characterizations of the differential uniformity of vectorial functions by the Walsh transform, IACR ePrint Archive 2017/516], the author has, for each even positive δδ, characterized...
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Non-Interactive Assumptions Computational Assumptions Target Assumptions
2017/4/24
Our analysis identifies two families of intractability assumptions, the qq-Generalized Diffie-Hellman Exponent assumptions and the qq-Simple Fractional assumptions that imply all other target assumpti...
Efficient Encryption from Random Quasi-Cyclic Codes
Code-based Cryptography Public-Key Encryption Post-Quantum Cryptography
2017/1/3
We propose a framework for constructing efficient code-based encryption schemes from codes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first pr...
Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
MDS matrices involutions cyclic codes
2016/12/7
A good linear diffusion layer is a prerequisite in the design of block ciphers. Usually it is obtained by combining matrices with optimal diffusion property over the Sbox alphabet. These matrices are ...
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
discrete logarithm problem finite cyclic groups
2016/1/23
The Discrete Logarithm Problem is at the base of the famous Diffie Hellman key agreement algorithm and many others. The key idea behind Diffie Helmann is the usage of the Discrete Logarithm function i...
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Public key cryptosystem Reed-Solomon code Cyclic code
2015/12/24
In this paper, we first present a new class of code based public key cryptosystem(PKC) based on ReedSolomon
code over extension field of less than m=9, referred to as K(XVI)SE(1)PKC. We then present ...
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0
public-key cryptography / Public key cryptosystem Error-correcting code Code based PKC Multivariate PKC Gr鯾 ner bases PQC
2012/3/23
In this paper, we present a new class of public-key cryptosystems, K(IX)SE(1)PKC realizing the coding rate of exactly 1.0, based on random pseudo cyclic codes. We show that K(IX)SE(1)PKC is secure aga...
Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security
Homomorphic Encryption Cyclic Groups Chosen-Ciphertext Security
2010/3/16
Chosen-Ciphertext (IND-CCA) security is generally considered the right notion of security
for a cryptosystem. Because of its central importance much eort has been devoted to constructing
IND-CCA se...
A Multivariate Signature Scheme with an almost cyclic public key
Multivariate Cryptography UOV Signature Scheme cyclic public key
2009/9/27
Multivariate public key cryptography is one of the main approaches to guarantee
the security of communication in a post quantum world. One of the major drawbacks in
this area is the huge size of the...