搜索结果: 1-15 共查到“军事学 statistical”相关记录74条 . 查询时间(0.146 秒)
The Power of NIST Cryptographic Statistical Tests Suite
Statistical testing Cryptographic evaluation Random bit generators
2019/8/8
This paper is focused on an open question regarding the correlation and the power of NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve the ...
We give the first construction of statistical Zaps. Our construction satisfies computational soundness and relies on the quasi-polynomial hardness of learning with errors assumpteprint.iacr.orgion.
Dwork and Naor (FOCS'00) first introduced and constructed two message public coin witness indistinguishable proofs (ZAPs) for NP based on trapdoor permutations. Since then, ZAPs have also been obtaine...
On Round Optimal Statistical Zero Knowledge Arguments
zero knowledge collision resistance statistically hiding commitments
2019/6/4
We construct the first three message statistical zero knowledge arguments for all of NP, matching the known lower bound. We do so based on keyless multi-collision resistant hash functions and other st...
Statistical Analysis and Anonymity of TOR's Path Selection
onion routing cryptography cyber security
2019/6/3
Tor is a network based on the onion routing infrastructure and provides many advantages, including tracking avoidance, research, wider access and, unfortunately, illegal activities. To achieve this, t...
A note on the correlations between NIST cryptographic statistical tests suite
statistical testing cryptographic evaluation random bit generators
2019/5/24
This paper is focused on an open question regarding the correlation and the power of the NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve ...
Protecting against Statistical Ineffective Fault Attacks
Fault countermeasures Implementation security Fault attack
2019/5/23
At ASIACRYPT 2018 it was shown that Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of symmetric cryptography. In particular, countermeasures against both...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
A Countermeasure Against Statistical Ineffective Fault Analysis
fault injection attacks ineffective fault analysis countermeasures
2019/5/21
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good protection against analysis methods that require the faulty ciphertext to derive the secret information, suc...
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Related-Tweak Statistical Saturation KDIB Conditional Equivalence
2019/3/1
Statistical saturation attack takes advantage of a set of plaintext with some bits fixed while the others vary randomly, and then track the evolution of a non-uniform plaintext distribution through th...
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Statistical Learning Theory Encrypted Database Attacks
2019/1/9
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks t...
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Cryptanalysis indistinguishability obfuscation multilinear map
2018/11/12
We introduce a new type of cryptanalytic algorithm on the obfuscations based on the branching programs. Applying this algorithm to two recent general-purpose obfuscation schemes one by Chen et al. (CR...
We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statistical privacy for the sender even against malicious receivers. Receiver privacy is game based and relies...
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
Computational Statistical Optimal
2018/5/28
Extensive efforts are currently put into securing messaging platforms, where a key challenge is that of protecting against man-in-the-middle attacks when setting up secure end-to-end channels. The vas...
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Implementation attack Fault attack SFA
2018/4/19
Implementation attacks like side-channel and fault attacks are a threat for deployed devices especially if an attacker has physical access to a device. As a consequence, devices like smart cards usual...