搜索结果: 1-12 共查到“军事学 Processing”相关记录12条 . 查询时间(0.062 秒)
Approx-SVP in Ideal Lattices with Pre-processing
heuristic assumptions pre-processing phase outputs
2019/2/28
We describe an algorithm to solve the approximate Shortest Vector Problem for lattices corresponding to ideals of the ring of integers of an arbitrary number field KK. This algorithm has a pre-process...
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Secure search Fully homomorphic encryption Randomized algorithms
2019/1/2
We present a novel secure searchsecure search protocol on data and queries encrypted with Fully Homomorphic Encryption (FHE). Our protocol enables organizations (client) to (1) securely upload an unso...
An attacker or evaluator can detect more information leakages if he improves the Signal-to-Noise Ratio (SNR) of power traces in his tests. For this purpose, pre-processings such as de-noise, distribut...
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing --
side channel attacks machine learning deep learning
2017/8/10
In the context of the security evaluation of cryptographic implementations, profiling attacks (aka Template Attacks) play a fundamental role. Nowadays the most popular Template Attack strategy consist...
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
homomorphic encryption privacy-preserving computation privacy-preserving statistics
2017/4/19
We consider the problem of privacy-preserving processing of outsourced data, where a Cloud server stores data provided by one or multiple data providers and then is asked to compute several functions ...
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Password-based key derivation memory usage cryptographic sponges
2016/1/26
We present Lyra, a password-based key derivation scheme
based on cryptographic sponges. Lyra was designed to be strictly sequential
(i.e., not easily parallelizable), providing strong security even ...
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Oblivious RAM Secure Two-Party Computation Garbled Circuits
2016/1/26
We present a novel mechanism that allows a client to securely outsource his
private data to the cloud while at the same time to delegate to a third party the right to
run certain algorithms on his d...
Cofactorization on Graphics Processing Units
Cofactorization Graphics Processing Unit Number Field Sieve
2016/1/9
We show how the cofactorization step, a compute-intensive part of the relation
collection phase of the number field sieve (NFS), can be farmed out to a graphics processing
unit. Our implementation o...
Dynamic Behavior of RS latches using FIB processing and probe connection
implementation Physically Unclonable Function FIB
2016/1/6
PUF (Physically Unclonable Function) technologies attract
attention as a candidate to prevent counterfeit chips. A latch PUF is
known as a high performance PUF among various types of proposed
PUFs....
Private Processing of Outsourced Network Functions: Feasibility and Constructions
private network function virtualization BGN cryptosystem public key encryption with keyword search
2015/12/22
With organizations increasingly willing to outsource their network functions (e.g., firewalls, traffic shapers and intrusion detection systems) to the cloud, aiming to reduce the cost and complexity o...
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky and Aviv Zohar
Fast Money Transaction Processing
2014/3/5
Bitcoin is a potentially disruptive new crypto-currency based on a decentralized open-source protocol which is gradually gaining popularity. Perhaps the most important question that will affect Bitcoi...
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Authentication Authenticated query processing
2014/3/5
In this paper we address the problem of authenticated query processing in outsourced databases. An authenticated query processing mechanism allows a client to verify the validity of the query response...