搜索结果: 1-15 共查到“军事学 class”相关记录72条 . 查询时间(0.5 秒)
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Isogeny-based cryptography digital signature class group
2019/5/21
In this paper we report on a new record class group computation of an imaginary quadratic field having 154-digit discriminant, surpassing the previous record of 130 digits. This class group is central...
SeaSign: Compact isogeny signatures from class group actions
post-quantum crypto isogenies
2018/11/19
We give a new signature scheme for isogenies that combines the class group actions of CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of size less than one ki...
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Elgamal cryptosystem Side-channel attacks Montgomery Ladder
2018/8/21
In 2005, Yen et al. proposed the first N−1N−1 attack on the modular exponentiation algorithms such as BRIP and square-and-multiply-always methods. This attack makes use of the ciphertext N...
A new class of irreducible pentanomials for polynomial based multipliers in binary fields
irreducible pentanomials polynomial multiplication modular reduction
2018/6/5
We give the total cost of the multiplier and found that the bit-parallel multiplier defined by this new class of polynomials has improved XOR and AND complexity. Our multiplier has comparable time del...
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Profiled side-channel attacks Imbalanced datasets Synthetic examples
2018/5/28
We concentrate on machine learning techniques used for profiled side-channel analysis when having imbalanced data. Such scenarios are realistic and often occurring, for instance in the Hamming weight ...
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
Structure-preserving signatures security proof standard assumptions
2018/1/11
Structure-preserving signatures on equivalence classes, or equivalence-class signatures for short (EQS), are signature schemes defined over bilinear groups whose messages are vectors of group elements...
A Uniform Class of Weak Keys for Universal Hash Functions
Universal hash function weak key Wegman-Carter scheme
2017/5/23
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial properties. We find that any UHF has a general class of keys, which makes the combinatorial propertie...
Short Stickelberger Class Relations and application to Ideal-SVP
Lattices Ideal-SVP Cryptanalysis
2016/12/9
In this work, we generalize the previous result to general ideals. We show an efficient way of finding a close enough principal multiple of any ideal by exploiting the classical theorem that, in our s...
A New Class of Differentially 4-uniform Permutations from the Inverse Function
Differentially 4-uniform permutation Substitute box 4-Uniform BFI
2016/12/8
Differentially 4-uniform permutations on F22kF22k with high nonlinearity and algebraic degree are often used in block ciphers and some stream ciphers as Substitution boxes. Recently,Chen et al.(An equ...
Reducing number field defining polynomials: An application to class group computations
number theory class group computation
2016/6/2
In this paper, we describe how to compute smallest monic polynomials that define a given number field K. We make use of the one-to-one correspondence between monic defining polynomials of K and algebr...
$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
implementation implementation
2016/1/26
We present explicit formulae and complexities of bit-parallel GF(2n) squarers for a new class of irreducible pentanomials xn+xn−1+xk+x+1, where n is odd and 1as...
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Boolean functions Fourier and Walsh-Hadamard transforms entropy
2016/1/26
We consider the Fourier Entropy-Influence (FEI) conjecture in
the context of cryptographic Boolean functions. We show that the FEI conjecture
is true for the functions satisfying the strict avalanch...
A new class of system oriented PKC, K(I)SOPKC.
Code based PKC Multivariate PKC System oriented PKC
2016/1/26
In this paper, we present a new type of PKC, system-oriented PKC,referred to as K(I)SOPKC that can
be well adapted to a secure and a high speed communication between various systems and organizations...
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Foundations Pseudorandom Generators One-way Functions
2016/1/9
We revisit “the randomized iterate” technique that was originally used by Goldreich, Krawczyk,
and Luby (SICOMP 1993) and refined by Haitner, Harnik and Reingold (CRYPTO 2006) in constructing
pseudo...
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
Public-key cryptosystem Gr¨obner basis attack Multivariate PKC
2016/1/7
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials
(Multi-variate PKC, MPKC) over F2 and F2m. However most of the proposed MPKC are proved not
secure....