搜索结果: 1-10 共查到“军事学 Java”相关记录10条 . 查询时间(0.156 秒)
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Post-Quantum Cryptography Lattice-based Encryption Scheme Java Card
2019/1/2
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could...
Is Java Card ready for hash-based signatures?
Post-quantum cryptography hash-based signatures Java Card
2018/6/25
The current Java Card platform does not seem to allow for fast implementations of hash-based signature schemes. While the underlying implementation of the cryptographic primitives provided by the API ...
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
implementation-level analysis simulation-based security
2016/1/26
In our previous work, we have proposed a framework which allows
tools that can check standard noninterference properties but a priori cannot deal
with cryptography to establish cryptographic indisti...
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
cryptographic protocols interactive theorem-proving implementation-level analysis
2016/1/8
We provide a proof of correctness and security of a two-party-computation protocol based
on garbled circuits and oblivious transfer in the presence of a semi-honest sender. To achieve this we are
th...
A Hybrid Approach for Proving Noninterference of Java Programs
cryptographic protocols code-level cryptographic analysis
2015/12/30
Several tools and approaches for proving noninterference properties for Java and other languages exist. Some of them have a high degree of automation or are even fully automatic, but overapproximate t...
On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
pseudorandomness
2014/3/11
Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and symmetric key block ciphers (e.g., AES and TDES) have been commonly used to design pseudorandom generators with ...
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Elliptic Curve Cryptography Prime-Field Arithmetic Endomorphism
2012/3/20
The Micro Edition is of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since t...
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Elliptic Curve Cryptography Prime-Field Arithmetic Endomorphism
2012/8/28
The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since the ...
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Tate Pairing Mobile Phone Java
2008/12/16
Efficient Implementation of Tate Pairing on a Mobile Phone using Java.