军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 gap相关记录16条 . 查询时间(0.109 秒)
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Furthermore, we also provide bounds, in terms of nn and qq, on the partial reconstruction and privacy thresholds, a more fine-grained notion that considers the amount of information about the secret t...
Secure messaging apps have enjoyed huge uptake, and with the headline figure of one billion active WhatsApp users there has been a corresponding burst of academic research on the topic. One might ther...
Two types of tweakable blockciphers based on classical blockciphers have been presented over the last years: non-tweak-rekeyable and tweak-rekeyable, depending on whether the tweak may influence the k...
Cryptographic implementations are vulnerable to side-channel analysis. Implementors often opt for masking countermeasures to protect against these types of attacks. Masking countermeasures can ensure ...
The accuracy and the fast convergence of a leakage model are both essential components for the efficiency of side-channel analysis. Thus for efficient leakage estimation an evaluator is requested to p...
With the evidence on comprised cryptographic standards in the context of elliptic curves, the IETF TLS working group has issued a request to the IETF Crypto Forum Research Group (CFRG) to recommend ne...
Using EasyCrypt, we formalize a new modular security proof for one-round authenticated key exchange protocols in the random oracle model. Our proof improves earlier work by Kudla and Paterson (ASIACRY...
. In this paper, we evaluate the performances of state-of-theart higher-order masking schemes for the AES. Doing so, we pay a particular attention to the comparison between specialized solutions int...
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Die-Hellman (GDH) group (where the Computational Die-Hellman pr...
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem.
In this paper, the authors propose a new structured multisignature scheme that considers the signing order among co-signers. The proposed scheme can resolve signing structures of serial, parallel, an...
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic curve cryptosystems (E...
We propose a practical key encapsulation mechanism with a simple and intuitive design con- cept. Security against chosen-ciphertext attacks can be proved in the standard model under a new assumption,...
Cryptography is an important tool in the design and implementation of electronic voting schemes for it provides the property of verifiability, which is not provided in the traditional voting. But in t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...