搜索结果: 1-7 共查到“军事学 precision”相关记录7条 . 查询时间(0.125 秒)
High-Precision Privacy-Preserving Real-Valued Function Evaluation
Multiparty Computation Numerical Precision Fourier
2017/12/25
We propose a novel multi-party computation protocol for evaluating continuous real-valued functions with high numerical precision. Our method is based on approximations with Fourier series and uses at...
High-Precision Arithmetic in Homomorphic Encryption
homomorphic encryption encoding encrypted arithmetic
2017/8/29
In most RLWE-based homomorphic encryption schemes the native plaintext elements are polynomials in a ring Zt[x]/(xn+1)Zt[x]/(xn+1), where nn is a power of 22, and tt an integer modulus. For performing...
Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic
Lattice reduction lattice techniques
2016/5/30
Lattice reduction is fundamental in computational number theory and in computer science, especially in cryptography. The celebrated Lenstra–Lenstra–Lovász reduction algorithm (called LLL or L3) has be...
High-precision Secure Computation of Satellite Collision Probabilities
Secure Computation Numerical Analysis
2016/3/23
The costs of designing, building, launching and maintaining satellites make satellite operators extremely motivated to protect their on-orbit assets. Unfortunately, privacy concerns present a serious ...
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Reduced-Precision Residue Number System Residue Number System (RNS) modular exponentiation
2016/1/5
We built and tested the first hardware implementation of Phatak’s Quotient-First Scaling (QFS) algorithm in the reduced-precision residue number system (RP-RNS). This algorithm is designed to expedite...
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Fault attacks instructions cache embedded systems
2016/1/4
Hardware and software of secured embedded systems are prone to physical attacks. In particular,
fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker ...
Gaussian Sampling Precision in Lattice Cryptography
Post-Quantum Cryptography Lattice Public Key Cryptography Gaussian Sampling
2015/12/22
Security parameters and attack countermeasures for Lattice-based cryptosystems have
not yet matured to the level that we now expect from RSA and Elliptic Curve implementations.
Many modern Ring-LWE ...