搜索结果: 1-3 共查到“军队指挥学 auxiliary-inputs”相关记录3条 . 查询时间(0.055 秒)
Strong Authenticated Key Exchange with Auxiliary Inputs
cryptographic protocols Authenticated Key Exchange
2017/5/16
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic...
For any pair (X,Z)(X,Z) of correlated random variables we can think of ZZ as a randomized function of XX. If the domain of ZZ is small, one can make this function computationally efficient by allowing...
Encryption Schemes with Post-Challenge Auxiliary Inputs
leakage-resilient auxiliary inputs
2014/3/12
In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both the secret key owner and the encryptor, in the auxiliary input model. Ex...