搜索结果: 1-6 共查到“军队指挥学 backdoors”相关记录6条 . 查询时间(0.078 秒)
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
block ciphers Boolean functions Algebraic Normal Form
2018/11/19
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt’95 (adapted to Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making such attacks wo...
Backdooring cryptographic algorithms is an indisputable taboo in the cryptographic literature for a good reason: however noble the intentions, backdoors might fall in the wrong hands, in which case se...
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
discrete logarithm problem diffie-hellman small subgroup attack
2016/12/8
Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parame...
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Backdoor Surveillance PRNG with input
2016/6/6
Inspired by the Dual EC DBRG incident, Dodis et al. (Eurocrypt
2015) initiated the formal study of backdoored PRGs, showing
that backdoored PRGs are equivalent to public key encryption schemes,
giv...
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Practical Alternative Government Decryption Backdoors
2016/3/7
A cryptographic contract and enforcement technology would guarantee release of a data
decryption key to an authorized party if and only if predetermined contract
requirements are satisfied. Threshol...
We present extremely simple ways of embedding a backdoor
in the key generation scheme of RSA. Three of our schemes generate
two genuinely random primes p and q of a given size, to obtain their
publ...