搜索结果: 1-10 共查到“知识库 军事学 behavior”相关记录10条 . 查询时间(0.328 秒)
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
passwords secure computation differential privacy, heavy hitters
2018/1/12
Bad choices of passwords were and are a pervasive problem. Most password alternatives (such as two-factor authentication) may increase cost and arguably hurt the usability of the system. This is of sp...
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Bitcoin Mining Selfish mining
2018/1/2
Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy space has been extended by many works. These works only analyze the stra...
The LLL algorithm (from Lenstra, Lenstra and Lovász) and its generalization BKZ (from Schnorr and Euchner) are widely used in cryptanalysis, especially for lattice-based cryptography. Precisely unders...
On Analyzing Program Behavior Under Fault Injection Attacks
fault attacks fault simulator instruction set simulator
2016/12/7
Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced b...
Dynamic Behavior of RS latches using FIB processing and probe connection
implementation Physically Unclonable Function FIB
2016/1/6
PUF (Physically Unclonable Function) technologies attract
attention as a candidate to prevent counterfeit chips. A latch PUF is
known as a high performance PUF among various types of proposed
PUFs....
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
Boolean functions balancedness algebraic immunity fast algebraic attack
2011/7/25
In this paper, we present a new combinatorial conjecture about binary strings. Based on the new conjecture, two classes of Boolean functions of $2k$ variables with optimal algebraic immunity are propo...
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
secret-key cryptography / Boolean functions balancedness algebraic immunity fast algebraic attack algebraic degree nonlinearity
2012/3/27
In this paper, we present a new combinatorial conjecture about binary strings. Based on the new conjecture, two classes of Boolean functions of $2k$ variables with optimal algebraic immunity are propo...
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
DPA attacks CMOS cryptographic devices leakage behavior
2008/11/26
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior.
Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Asymptotic Behavior Binary Primitive Irreducible Polynomials
2008/8/14
In this paper we study the ratio (n) = 2(n) 2(n) , where 2(n) is the number
of primitive polynomials and 2(n) is the number of irreducible polynomials
in GF(2)[x] of degree n. Let n = Q`i=1 prii...
Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Asymptotic Behavior of the Ratio Binary Primitive Irreducible Polynomials
2008/6/2
In this paper we study the ratio (n) = 2(n) 2(n) , where 2(n) is the number
of primitive polynomials and 2(n) is the number of irreducible polynomials
in GF(2)[x] of degree n.