搜索结果: 1-15 共查到“军事学 Methods”相关记录35条 . 查询时间(0.091 秒)
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
side-channel analysis leakage detection security certification
2019/9/16
The ISO standardisation of `Testing methods for the mitigation of non-invasive attack classes against cryptographic modules' (ISO/IEC 17825:2016) specifies the use of the Test Vector Leakage Assessmen...
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Revocable identity-based encryption Subset difference method Generic construction
2019/7/15
To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue. Recently, Ma and Lin proposed a generic...
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
hash function Troika preimage
2019/6/4
Troika is a recently proposed sponge-based hash function for IOTA's ternary architecture and platform, which is developed by CYBERCRYPT. In this paper, we introduce the preimage attack on 2 and 3 roun...
Numerical Methods for Comparison on Homomorphically Encrypted Numbers
Homomorphic Encryption Comparison Min/Max
2019/4/25
We propose a new method to compare numbers which are encrypted by Homomorphic Encryption (HE). Previously, comparison and min/max functions were evaluated using Boolean functions where input numbers a...
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Side-Channel Attacks Deep Learning Machine Learning
2019/2/26
Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, resea...
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
indistinguishability obfuscation functional encryption bootstrapping
2018/6/27
In a recent work, Lin and Tessaro [LT17] (LT) show that iO may be constructed using i) Functional Encryption (FE) for polynomials of degree LL , ii) Pseudorandom Generators (PRG) with blockwise locali...
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
s-box substitution involutory substitution
2018/4/25
S-boxes are important parts of modern ciphers. To construct S-boxes having cryptographic parameters close to optimal is an unsolved problem at present time. In this paper some new methods for generati...
Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
GSW integer multiplication packing
2016/5/23
We introduce new methods to evaluate integer polynomials
with GSW FHE. Our methods cause much slower noise growth and result
in much better efficiency in the evaluation of low-degree large plaintext...
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Coppersmith Methods Analytic Combinatorics Cryptanalysis
2016/1/27
The Coppersmith methods is a family of lattice-based techniques to find small integer
roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent
development...
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
formal verification computational security guarantees
2016/1/27
In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the techni...
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Identity-based encryption Revocable identity-based encryption Key revocation
2016/1/25
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important
since a user’s credential (or private key) can be expired or revealed. Revocable IBE (RIBE) is an ext...
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
side-channel attacks template attack stochastic model
2016/1/6
Template attacks and stochastic models are among the most
powerful side-channel attacks. However, they can be computationally
expensive when processing a large number of samples. Various compression...
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
ARX block ciphers hash functions
2016/1/6
This paper explores the approximation of addition mod 2n
by addition mod 2w, where
1 ≤ w ≤ n, in ARX functions that use large words (e.g., 32-bit words or 64-bit words). Three main areas
are explor...
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Precomputation Post-Quantum Signatures Hash-based Signatures
2015/12/31
Precomputation techniques are useful to improve realtime
performance of complex algorithms at the expense of extra
memory, and extra preparatory computations. This practice is neglected
especially ...
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Broadcast encryption Identity-based revocation Subset cover framework
2015/12/22
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send
a ciphertext to a set of receivers. In IBR, a ciphertext is associated with a set of revoked users...