搜索结果: 1-15 共查到“军事学 Evaluation”相关记录128条 . 查询时间(0.204 秒)
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Applied Cryptography Decision Tree Homomorphic Encryption
2019/7/17
Decision tree and its generalization of random forests are a simple yet powerful machine learning model for many classification and regression problems. Recent works propose how to privately evaluate ...
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Location privacy Geohashing Spatial cloaking
2019/7/17
Location data is an important piece of contextual information in location-driven features for geosocial and pervasive computing applications. In this paper, we propose to geo-hash locations using spac...
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
side-channel analysis leakage detection security certification
2019/6/14
An established ingredient in the security evaluation of cryptographic devices is leakage detection, whereby physically observable characteristics such as the power consumption are measured during oper...
Simulating Homomorphic Evaluation of Deep Learning Predictions
neural networks homomorphic encryption TFHE
2019/5/31
Convolutional neural networks (CNNs) is a category of deep neural networks that are primarily used for classifying image data. Yet, their continuous gain in popularity poses important privacy concerns...
Evaluation of Code-based Signature Schemes
post-quantum cryptography code-based cryptography signature scheme
2019/5/23
Code-based cryptographic schemes recently raised to prominence as quantum-safe alternatives to the currently employed number-theoretic constructions, which do not resist quantum attacks. In this artic...
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
fault attack neural network deep learning
2019/5/13
Deep learning is becoming a basis of decision making systems in many application domains, such as autonomous vehicles, health systems, etc., where the risk of misclassification can lead to serious con...
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Efficient Implementation Side-Channel Evaluation
2019/4/22
Although security against side-channel attacks is not an explicit design criterion of the NIST post-quantum standardization effort, it is certainly a major concern for schemes that are meant for real-...
An Efficient Private Evaluation of a Decision Graph
decision graph homomorphic encryption oblivious transfer and GLOUDS
2019/4/1
A decision graph is a well-studied classifier and has been used to solve many real-world problems. We assumed a typical scenario between two parties in this study, in which one holds a decision graph ...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
S-box Survey Design criteria
2019/3/1
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes. Continuously developed for decades, S-bo...
Secure Evaluation of Quantized Neural Networks
Machine Learning Multi-Party Computation Quantization
2019/2/27
Machine Learning models, and specially convolutional neural networks (CNNs), are at the heart of many day-to-day applications like image classification and speech recognition. The need for evaluating ...
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Post-Quantum Cryptography Hardware Implementation
2019/1/26
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer a...
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
security evaluation Renyi divergence square-friendly
2019/1/26
Dodis and Yu (TCC 2013) studied how the security of cryptographic primitives that are secure in the "ideal" model in which the distribution of a randomness is the uniform distribution, is degraded whe...
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Block Cipher Differential Cryptanalysis MILP
2019/1/9
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve the two...
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
information theoretic multi-party computation oblivious linear evaluation
2019/1/2
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an evaluation of a sender's private, degree 11 polynomial, without letting the sender learn the evaluation p...