搜索结果: 1-15 共查到“知识库 More Resistant”相关记录320条 . 查询时间(0.109 秒)
Abietic acid encapsulated Sn-57Bi alloy nanoparticles as oxidation resistant solder material
Sn-57Bi alloy nanoparticles abietic acid encapsulation metal oxide reduction
2023/12/21
Low-melting point solder Sn-57Bi alloy nanoparticles were synthesized and encapsulated with abietic acid (aa) thin layer to form a core-shell structure. Formation of nanoparticle enhances its mechanic...
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Commitment schemes subversion security common reference string model
2019/9/23
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Logic locking Block cipher Hardware obfuscation
2019/8/30
Protection of intellectual property (IP) cores is one of the most practical security concern for modern integrated circuit (IC) industry. Albeit being well-studied from a practical perspective, the pr...
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
public-key cryptography traitor tracing, revocation
2019/8/30
A traitor tracing scheme is a multi-user public-key encryption scheme where each user in the system holds a decryption key that is associated with the user's identity. Using the public key, a content ...
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
AEAD AES-GCM AES-GCM-SIV
2019/8/6
We propose a new nonce-misuse-resistant authenticated encryption scheme, which instantiates the SIV paradigm of Rogaway and Shrimpton. In contrast to the GCM-SIV approach proposed by Gueron and Lindel...
Athena: A verifiable, coercion-resistant voting system with linear complexity
cryptographic protocols election schemes
2019/7/8
Seminal work by Juels, Catalano & Jakobsson delivered a verifiable, coercion-resistant voting system with quadratic complexity. This manuscript attempts to advance the state-of-the-art by delivering a...
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Collision Resistance Statistical Zero Knowledge Black box separations
2019/6/12
The complexity of collision-resistant hash functions has been long studied in the theory of cryptography. While we often think about them as a Minicrypt primitive, black-box separations demonstrate th...
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Witness Encryption Trace and Revoke Broadcast Encryption
2019/1/18
An emerging trend is for researchers to identify cryptography primitives for which feasibility was first established under obfuscation and then move the realization to a different setting. In this wor...
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Identity-Based Proxy Re-Encryption Collusion-resistance Random Oracle
2018/11/29
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy ...
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Data oblivious computing constant time computing secure hardware
2018/11/19
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in hardware security today. Recently, there has been a surge of effort that attempts to block these leakages ...
Practical Strategy-Resistant Privacy-Preserving Elections
cryptographic protocols Privacy voting
2018/11/19
Recent advances in cryptography promise to let us run complex algorithms in the encrypted domain. However, these results are still mostly theoretical since the running times are still much larger than...
Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
Blockchain Consensus protocol Byzantine agreement
2018/11/14
We present Helix, a Byzantine fault tolerant and scalable consensus algorithm for fair ordering of transactions among nodes in a distributed network. In Helix, one among the network nodes proposes a p...
"S-Box" Implementation of AES is NOT side-channel resistant
AES Side- channel Cache Lookup table
2018/11/5
Several successful cache-based attacks have provided strong impetus for developing side channel resistant software implementations of AES. One of the best-known countermeasures - use of a "minimalist"...
TNFS Resistant Families of Pairing-Friendly Elliptic Curves
Pairings elliptic curves pairing-friendly parameters
2018/11/2
Recently there has been a significant progress on the tower number field sieve (TNFS) method, reducing the complexity of the discrete logarithm problem (DLP) in finite field extensions of composite de...
On Distributional Collision Resistant Hashing
Collision Resistant Hashing Distributional Hashing Multi-Collision Resistance
2018/5/28
Collision resistant hashing is a fundamental concept that is the basis for many of the important cryptographic primitives and protocols. Collision resistant hashing is a family of compressing function...