搜索结果: 1-5 共查到“军事学 bridging”相关记录5条 . 查询时间(0.014 秒)
Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning
Algorithmic mechanism Intelligent reasoning Threat analytics
2016/12/10
This work presents the construction of intelligent algorithmic mechanism based on multidimensional view of intelligent reasoning, threat analytics, cryptographic solutions and secure multiparty comput...
Full Disk Encryption: Bridging Theory and Practice
disk encryption theory full disk encryption FDE
2016/12/7
We revisit the problem of Full Disk Encryption (FDE), which
refers to the encryption of each sector of a disk volume. In the context
of FDE, it is assumed that there is no space to store additional ...
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
side-channel analysis MI PI
2016/7/22
The accuracy and the fast convergence of a leakage model are both essential components for the efficiency of side-channel analysis. Thus for efficient leakage estimation an evaluator is requested to p...
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Block Ciphers Key-Bridging Technique Automatic Search
2016/5/3
Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. At ASIACRYPT 2011, Dunkelman et al. proposed a technique using the weakness in ...
Triple and Quadruple Encryption: Bridging the Gaps
Cascade encryption Indistinguishability Tigh
2016/1/26
Triple encryption is a cascade of three block cipher evaluations
with independent keys, in order to enlarge its key size. This
design is proven secure up to approximately 2κ+min{κ/2,n/2}
queries (b...