搜索结果: 1-15 共查到“军事学 Distance”相关记录39条 . 查询时间(0.139 秒)
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
lattice Gaussian sampling Markov chain Monte Carlo bounded distance decoding
2019/6/5
Sampling from the lattice Gaussian distribution plays an important role in various research fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is advanced in several f...
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Program Obfuscation Hamming Distance Conjunctions
2019/6/4
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an nn-bit input and a fixed nn-bit target vector is smaller than some p...
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
finite-key unicity randomization
2019/6/4
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
privacy-preserving biometric authentication inner product encryption learning with errors
2018/12/24
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats b...
Another Look at Relay and Distance-based Attacks in Contactless Payments
Contactless Payments EMV-adaptations
2018/5/3
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
Fine-Grained and Application-Ready Distance-Bounding Security
DB-security properties DB protocols
2018/5/2
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...
Anonymous Distance-Bounding Identification
Distance-Bounding Anonymous Authentication Public-Key
2018/4/19
Anonymous Distance-Bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound from them, without revealing their identity. This is an attractive property that ...
Directional Distance-Bounding Identification Protocols
Distance-Bounding Public-Key Authentication Directional Antenna
2018/4/19
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. A public key distance bounding relies on the public key of the users to prove their identi...
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
lattice techniques Bounded Distance Decoding Minkowski's bound
2018/2/9
We propose a concrete family of dense lattices of arbitrary dimension n in which the lattice Bounded Distance Decoding (BDD) problem can be solved in deterministic polynomial time. This construction i...
Several access control systems are based on the users’ physical location/proximity to the access point. Distance- Bounding (DB) protocols constitute a classical solution to calculate the distance betw...
Efficient Privacy-Preserving Edit Distance and Beyond
important non-linear metric matching patient genomes
2017/7/19
Edit distance is an important non-linear metric that has many applications ranging from matching patient genomes to text-based intrusion detection. Privacy-preserving edit distance protocols have been...
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
distance-bounding terrorist-fraud anonymous authentication
2017/4/11
Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted prov...
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
cryptographic protocols grouping-proof distance-bounding
2017/2/20
In the recent IEEE communication letter ``Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close" by Karlsson and Mitrokotsa, a protocol for grouping-proof distance-bounding (GPDB) is...