搜索结果: 1-15 共查到“军事学 Virtual”相关记录18条 . 查询时间(0.218 秒)
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurren...
PERUN: Virtual Payment Channels over Cryptographic Currencies
cryptocurrencies smart contracts payments
2017/6/29
Payment channels emerged recently as an efficient method for performing cheap micropayment transactions in cryptographic currencies. In contrast to the traditional on-chain transactions, payment chann...
A Virtual Wiretap Channel for Secure MessageTransmission
information theoretic security wiretap channel wireless security
2017/3/6
In the Wyner wiretap channel, a sender is connected to a receiver and an eavesdropper through two noisy channels. It has been shown that if the noise in the eavesdropper channel is higher than the rec...
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
cryptographic agents obfuscation simulation-based security
2016/12/10
We extend the simulation-based definition of Virtual Grey Box (VGB) security -- originally proposed for obfuscation (Bitansky and Canetti, 2010) -- to a broad class of cryptographic primitives. These ...
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality
virtual proof of reality physical unclonable function PUF
2016/1/26
A new security protocol of virtual proof of reality (VP) is recently
proposed by Ruhrmair et al. The VP allows one party, the prover,
making a physical statement to the other party, the verifier, ov...
Virtual Proofs of Reality
Physical Unclonable Functions (PUFs) Interactive Proofs Quantum Cryptography
2016/1/9
In this paper, we discuss the question how physical statements can be proven remotely over digital communication channels, but without using classical secret keys, and without assuming tamper-resistan...
On Virtual Grey Box Obfuscation for General Circuits
Obfuscation Multilinear Graded Encodings Semantic Security
2016/1/8
An obfuscator O is Virtual Grey Box (VGB) for a class C of circuits if, for any C ∈ C and
any predicate π, deducing π(C) given O(C) is tantamount to deducing π(C) given unbounded
computational resou...
Secure Key Exchange Protocol based on Virtual Proof of Reality
Key exchange Virtual Proof PUF
2015/12/30
Securely sharing the same secret key among multiple parties is the main concern in symmetric cryptography that is the workhorse of modern cryptography due to its simplicity and fast speed. Typically a...
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Virtual Black-Box Obfuscation Idealized Models
2015/12/29
The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual blackbox
(VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth
(TCC’15) extended ...
Virtual Smart Cards: How to Sign with a Password and a Server
client-side cryptography consumer devices
2015/12/21
An important shortcoming of client-side cryptography on
consumer devices is the poor protection of secret keys. Encrypting the
keys under a human-memorizable password hardly offers any protection
w...
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
Auxiliary Input Virtual-Black-Box
2014/3/6
We show that if there exist indistinguishability obfuscators for a certain class C of circuits then there do not exist independent-auxiliary-input virtual-black-box (VBB) obfuscators for any family of...
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
secret-key cryptography Obfuscation
2014/3/10
We present a new general-purpose obfuscator for all polynomial-size circuits. The obfuscator uses graded encoding schemes, a generalization of multilinear maps. We prove that the obfuscator exposes no...
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
AES block ciphers cryptanalysis linear cryptanalysis
2013/4/18
In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That res...
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
foundations / cryptanalysis implementation AES Virtualization Side Channel Attack
2012/3/27
In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly...
A secure email login system using virtual password
Cryptography Email attack Security Virtual password
2010/9/14
In today’s world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virt...