搜索结果: 1-15 共查到“密码学 Keys”相关记录123条 . 查询时间(0.046 秒)
Tree authenticated ephemeral keys
public-key cryptography digital signatures key management
2019/8/14
Public key algorithms based on QC-MPDC and QC-LDPC codes for key encapsulation/encryption submitted to NIST post-quantum competition (BIKE, QC-MDPC KEM, LEDA) are vulnerable against reaction attacks b...
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed
weak keys authenticated encryption comet
2019/8/6
In this article, we analyze two of the NIST Round 1 Candidates for the Lightweight Cryptography Standardization Process: COMET and mixFeed. We show how AEAD modes that are based on rekeying can be mod...
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Multiparty computation Threshold ECDSA Honest majority
2019/8/6
A surge in DNS cache poisoning attacks in the recent years generated an incentive to push the deployment of DNSSEC forward. ICANN accredited registrars are required to support DNSSEC signing for their...
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Authenticated Key Exchange RLWE key reuse
2019/6/10
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in practice. Its authenticated version, Authenticated Key Exchange (AKE), avoids man-in-the-middle-based attacks by pro...
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Attribute-based Signatures delegation hierarchy path anonymity
2019/4/16
With Attribute-based Signatures (ABS) users can simultaneously sign messages and prove compliance of their attributes, issued by designated attribute authorities, with some verification policy. Neithe...
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Advanced Encryption Standard AES AES-192
2019/4/3
Concerning the side-channel attacks on Advanced Encryp- tion Standard, it seems that majority of studies focus on the lowest size: AES-128. Even when adaptable to higher sizes (AES-192 and AES-256), l...
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys
Lightweight Cryptography Message Authentication Robotic Network Security
2019/3/6
With increasing autonomous features of vehicles, key issues of robotic- and automotive engineering converge toward each other. Closing existing security gaps of device communication networks will be a...
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
blockcipher provable security multi-user security
2018/11/19
Our results hold in the multi-user setting as well, constituting the first non-trivial multi-user provable security results on Feistel ciphers. We finally demonstrate applications of our results on de...
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
DES TDES Template Attack
2018/11/7
We present an improved search strategy for a template attack on the secret DES key of a widely-used smart card, which is based on a Common-Criteria certified chip. We use the logarithm of the probabil...
Blending FHE-NTRU keys – The Excalibur Property
cryptographic protocols multiparty computaion fully homomorphic encryption
2018/9/6
Can Bob give Alice his decryption secret and be convinced that she will not give it to someone else? This is achieved by a proxy re-encryption scheme where Alice does not have Bob’s secret but instead...
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
cold boot attack lattice reduction number theoretic transform
2018/7/16
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the pr...
Attack on Kayawood Protocol: Uncloaking Private Keys
Kayawood protocol group-based cryptography key agreement
2018/6/19
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an...
Recovering short secret keys of RLCE in polynomial time
Code-based Cryptography McEliece encryption scheme key recovery attack
2018/6/5
We present a key recovery attack against Y. Wang's Random Linear Code Encryption (RLCE) scheme recently submitted to the NIST call for post-quantum cryptography. This attack recovers the secret key fo...
Unbounded Inner Product Functional Encryption, with Succinct Keys
Unbounded Vectors Functional Encryption Inner Product
2018/5/28
In 2015, Abdalla et al. introduced Inner Product Functional Encryption, where both ciphertexts and decryption keys are vectors of fixed size nn, and keys enable the computation of an inner product bet...
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
Cryptography Protocols Multi-Party Computation
2018/5/22
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it...