搜索结果: 1-5 共查到“军事学 expanding”相关记录5条 . 查询时间(0.085 秒)
How to leverage hardness of constant degree expanding polynomials over R to build iO
public-key cryptography Obfuscation
2019/9/16
In this work, we introduce and construct DD-restricted Functional Encryption (FE) for any constant D≥3D≥3, based only on the SXDH assumption over bilinear groups. This generalizes the notion of 33-res...
How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
FE Indistinguishability Obfuscation
2018/11/6
DD -restricted FE allows for useful evaluation of constant-degree polynomials, while only requiring the SXDH assumption over bilinear groups. As such, it is a powerful tool for leveraging hardness tha...
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Unbalanced Feistel Generic Attack Key Recovery
2016/12/29
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expand...
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
multivariate cryptography polynomials cryptanalysis
2015/12/29
We present a cryptanalysis of the ASASA public key cipher introduced at Asiacrypt 2014. This scheme alternates three layers of affine transformations A with two layers of quadratic substitutions S. We...
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Unbalanced Feistel permutations pseudo-random permutations Block ciphers
2008/8/14
Unbalanced Feistel schemes with expanding functions are used to construct pseudo-random permutations from kn bits to kn bits by using random functions from n bits to (k − 1)n bits. At each round...