搜索结果: 1-6 共查到“军事学 Potential”相关记录6条 . 查询时间(0.061 秒)
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications
Predicates verifiable random functions predicate encryption schemes
2017/8/29
Predicates are used in cryptography as a fundamental tool to control the disclosure of secrets. However, how to embed a particular predicate into a cryptographic primitive is usually not given much at...
The Internet of Things (IoT) has become a reality: small connected devices feature in everyday objects including childrens' toys, TVs, fridges, heating control units, etc. Supply chains feature sensor...
Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic
Lattice reduction lattice techniques
2016/5/30
Lattice reduction is fundamental in computational number theory and in computer science, especially in cryptography. The celebrated Lenstra–Lenstra–Lovász reduction algorithm (called LLL or L3) has be...
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Side Channel Analysis Hardware Biometric Coprocessor Biometric Comparison
2016/1/26
We study in this work the potential side channel leakages
of a hardware biometric comparison system that has been designed for
fingerprints.
Augmented Learning with Errors: The Untapped Potential of the Error Term
Lattice-Based Cryptography Encryption Scheme Lattice-Based Assumptions
2016/1/7
The Learning with Errors (LWE) problem has gained a lot of attention in recent years leading to
a series of new cryptographic applications. Specifically, it states that it is hard to distinguish rand...
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Internet security CA compromise
2014/3/13
The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issu...