搜索结果: 1-10 共查到“军事学 Light”相关记录10条 . 查询时间(0.145 秒)
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
private set intersection OT extension
2019/6/4
We describe a novel approach for two-party private set intersection (PSI) with semi-honest security. Compared to existing PSI protocols, ours has a more favorable balance between communication and com...
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
To ensure the validity of transactions, cryptocurrencies such as Bitcoin and Ethereum require nodes to verify that a proof-of-work blockchain is valid. Unfortunately, this often entails downloading an...
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators
TRNG FPGA Online Test
2016/4/18
We introduce the concept of canary numbers, to be used in
health tests for true random number generators. Health tests are essential
components of true random number generators because they are used...
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Experimental Results cryptographic protocols
2016/1/6
This paper describes techniques that enable vehicles to collect local information (such as road conditions
and traffic information) and report it via road-to-vehicle communications. To exclude malici...
This paper offers a new version of the hHB protocol denoted Light-hHB. This
proposal uses the same framework as hHB, that is a two stages protocol: the first
one for the establishment of a session k...
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Light-weight block cipher structural attack
2014/3/12
In [12], the authors present a new light-weight cryptographic primitive which supports an associated RFID-based authentication protocol. The primitive has some structural similarities to AES, but is p...
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
secret-key cryptography / light-weight cipher cryptanalysis A2U2
2012/3/28
At IEEE RFID 2011, David et al. proposed a new cryptographic primitive for use with RFID [2]. The design is a stream cipher called A2U2. Shortly afterwards, an attack was published on IACR Eprint by C...
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
secret-key cryptography light-weight cipher cryptanalysis A2U2
2011/6/9
At IEEE RFID 2011, David et al. proposed a new cryptographic primitive for use with RFID [2]. The design is a stream cipher called A2U2. Shortly afterwards, an attack was published on IACR Eprint by C...
Evaluating elliptic curve based KEMs in the light of pairings
public-key cryptography key encapsulation mechanisms pairings
2009/3/25
Several efforts have been made recently to put forward a set of cryptographic
primitives for public key encryption, suitable to be standardized. In two of them
(in the first place the NESSIE europea...