搜索结果: 1-15 共查到“军事学 Form”相关记录22条 . 查询时间(0.187 秒)
On cryptographic parameters of permutation polynomials of the form xrh(x(q−1)/d)
Permutation Polynomials Differential Uniformity Boomerang Uniformity
2019/7/8
The differential uniformity, the boomerang uniformity, and the extended Walsh spectrum etc are important parameters to evaluate the security of S(substitution)-box. In this paper, we introduce efficie...
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
secure computation secret sharing, active security
2019/4/16
Secure computation enables participating parties to jointly compute a function over their inputs while keeping them private. Secret sharing plays an important role for maintaining privacy during the c...
Algebraic normal form of a bent function: properties and restrictions
Boolean function bent function linear function
2018/12/3
Maximally nonlinear Boolean functions in nn variables, where n is even, are called bent functions. There are several ways to represent Boolean functions. One of the most useful is via algebraic normal...
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Bilinear target assumption q-type assumption DejaQ technique and Dual form signature technique
2018/8/16
A large number of parameterized complexity assumptions have been introduced in the bilinear pairing setting to design novel cryptosystems and an important question is whether such ``qq-type" assumptio...
This paper presents faster inversion-free point addition formulas for the curve y*(1+a*x^2)=c*x*(1+d*y^2). The proposed formulas improve the point doubling operation count record from 6M+5S to 8M and ...
We introduce the twisted μ4μ4-normal form for elliptic curves, deriving in particular addition algorithms with complexity 9M+2S9M+2S and doubling algorithms with complexity 2M+5S+2m2M+5S+2m over a bin...
Mastrovito form of Karatsuba Multiplier for All Trinomials
Karatsuba multiplier Mastrovito shifted polynomial basis
2016/7/14
We present a Matrix-vector form of Karatsuba multiplication over GF(2m)GF(2m) generated by an irreducible trinomial. Based on shifted polynomial basis (SPB), two Mastrovito matrices for different Kara...
We construct new randomized algorithms to find the exact solution to the shortest and closest vector problems (SVP and CVP) in Euclidean norm (l2) for the integral lattice. Not only the minimal norm o...
New Lattice Based Signature Using The Jordan Normal Form
Lattices Jordan Normal FormDigital Signature Scheme
2013/4/18
In this paper it is shown that the use of Jordan normal form instead of Hermite normal form would improve substantially the efficiency and the security of the lattice based signature scheme. In this s...
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
implementation elliptic curve cryptosystem
2013/2/21
Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progr...
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
hash functions keccak sha-3
2012/3/28
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parameters r,c and d receive values from the formal proposal for the Keccak hash function (with the hash o...
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
hash functions keccak sha-3
2011/6/9
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parameters r,c and d receive values from the formal proposal for the Keccak hash function (with the hash o...
Pairing Computation on Elliptic Curves of Jacobi Quartic Form
elliptic curve pairing geometric interpretation
2010/9/9
This paper proposes explicit formulae for the addition step and doubling step in Miller's algorithm to compute Tate pairing on Jacobi quartic curves. We present a geometric interpretation of the group...
In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties o...
ELLIPTIC CURVES IN MONTGOMERY FORM WITH B=1 AND THEIR LOW ORDER TORSION
Elliptic Curves Montgomery Form Low Order Torsion
2009/6/12
In this note we first characterize the class of Montgomery curves with
B = 1 by the simplicity of their transformation into short Weierstrass form and
explicitly determine their torsion points of or...