搜索结果: 1-15 共查到“军事学 r-pattern”相关记录15条 . 查询时间(0.118 秒)
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Zero-Leakage Information Hiding Winnowing
2019/5/27
How much we say, to whom, and when, is inherently telling, even if the contents of our communication is unclear. In other words: encryption is not enough; neither to secure privacy, nor to maintain co...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Searchable Encryption Hidden Vector Encryption Leakage Profile
2018/12/3
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) protocol with support for conjunctive keyword...
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
obfuscation generic group virtual black box
2018/3/5
We give a simple and efficient method for obfuscating pattern matching with wildcards. In other words, we construct a way to check an input against a secret pattern, which is described in terms of pre...
SWiM: Secure Wildcard Pattern Matching From OT Extension
Pattern Matching Oblivious Transfer PRF
2017/11/28
Suppose a server holds a long text string and a receiver holds a short pattern string. Secure pattern matching allows the receiver to learn the locations in the long text where the pattern appears, wh...
Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
Digital Signature Designated Verifier Signature Scheme Multi-Designated Verifiers Signature Scheme
2017/8/28
In a designated verifier signature (DVS) scheme, the validity of the signature can only be verified by a designated entity chosen by the signer. Furthermore, the designated entity cannot convince a th...
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
searchable encryption pattern-matching cloud computing
2017/2/23
Pattern matching is essential to applications such as filtering content in Data streams, searching on genomic data, and searching for correlation in medical data. However, increasing concerns of user ...
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Hardware Trojans Genetic Algorithm Boolean Satisfiability
2016/1/26
Test generation for Hardware Trojan Horses (HTH) detection
is extremely challenging, as Trojans are designed to be triggered by
very rare logic conditions at internal nodes of the circuit. In this p...
Outsourced Pattern Matching
pattern matching delegatable computation simulation-based security
2016/1/7
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their
computation and data to an untrusted server in the cloud. While most earlier work considers the ge...
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
secret key helper data
2014/3/10
Physically Unclonable Functions (PUFs) provide a unique signature for integrated circuits (ICs), similar to a fingerprint for humans. They are primarily used to generate secret keys, hereby exploiting...
Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions
search pattern searchable encryption index fake query
2013/4/18
Searching on remote encrypted data (commonly known as \textit{searchable encryption}) is becoming an important technique in secure data outsourcing, since it allows users to outsource encrypted data t...
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher
Fault-propagation pattern fault-propagation path differential fault analysis bitwise permutation SPN block cipher PRESENT PRINTcipher
2012/3/29
This paper proposes a novel fault-propagation pattern based differential fault analysis method - FPP-DFA, and proves its feasibility on SPN structure block ciphers using bitwise permutation, such as P...
Fault Propagate Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher
fault propagate pattern fault propagate path differential fault analysis bitwise permutation SPN block cipher PRESENT PRINTcipher
2011/2/24
PRESENT and PRINTcipher are two hardware-optimized ultra-lightweight block ciphers presented in CHES 2007 and CHES 2010, which is suitable for RFID tags and IC-Printing, the authors didn’t analyze the...
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Efficient Protocols Set Intersection Pattern Matching Malicious and Covert Adversaries
2009/6/11
In this paper we construct efficient secure protocols for set intersection and pattern match-
ing. Our protocols for securely computing the set intersection functionality are based on secure
pseudor...
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Ubiquitous computer XTR public key system XTR Exponentiation Algorithms
2009/3/4
Public-key cryptosystem (PKC) is one of inevitable key technologies
in order to accomplish fruitful security applications in ubiquitous computing systems.
The ubiquitous computer only has scarce com...