搜索结果: 1-15 共查到“军事学 gap”相关记录16条 . 查询时间(0.109 秒)
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Symmetric-key cryptography differential cryptanalysis lightweight cryptography
2018/7/19
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Secret Sharing asymptotic setting
2018/1/30
Furthermore, we also provide bounds, in terms of nn and qq, on the partial reconstruction and privacy thresholds, a more fine-grained notion that considers the amount of information about the secret t...
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
cryptographic protocols messaging implementation position
2017/10/10
Secure messaging apps have enjoyed huge uptake, and with the headline figure of one billion active WhatsApp users there has been a corresponding burst of academic research on the topic. One might ther...
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
Optimal security standard model ideal model
2017/5/31
Two types of tweakable blockciphers based on classical blockciphers have been presented over the last years: non-tweak-rekeyable and tweak-rekeyable, depending on whether the tweak may influence the k...
Mind the Gap: Towards Secure 1st-order Masking in Software
side-channel analysis masking AVR
2017/4/24
Cryptographic implementations are vulnerable to side-channel analysis. Implementors often opt for masking countermeasures to protect against these types of attacks. Masking countermeasures can ensure ...
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
side-channel analysis MI PI
2016/7/22
The accuracy and the fast convergence of a leakage model are both essential components for the efficiency of side-channel analysis. Thus for efficient leakage estimation an evaluator is requested to p...
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware
RFC7748 Curve448 hardware implementation
2016/4/7
With the evidence on comprised cryptographic standards in the context of elliptic curves, the IETF TLS working group has issued a request to the IETF Crypto Forum Research Group (CFRG) to recommend ne...
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Provable Security Security Protocols EasyCrypt
2016/1/4
Using EasyCrypt, we formalize a new modular security proof for one-round authenticated key exchange protocols in the random oracle model. Our proof improves earlier work by Kudla and Paterson (ASIACRY...
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Side-channel analysis countermeasures performance evaluations
2015/12/30
. In this paper, we evaluate the performances of state-of-theart
higher-order masking schemes for the AES. Doing so, we pay a particular
attention to the comparison between specialized solutions int...
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffe-Hellman-group signature scheme
Signature schemes threshold signatures multisignatures
2009/4/15
We propose a robust proactive threshold signature scheme, a multisignature scheme and a
blind signature scheme which work in any Gap Die-Hellman (GDH) group (where the Computational
Die-Hellman pr...
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
Identification Scheme Gap Diffie-Hellman Problem
2009/4/9
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem.
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
cryptography multisignature structured multisignature
2009/4/9
In this paper, the authors propose a new structured multisignature scheme that considers the signing
order among co-signers. The proposed scheme can resolve signing structures of serial, parallel, an...
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
hyperelliptic curves explicit formulae comparison HECC vs. ECC
2009/4/8
For most of the time since they were proposed, it was widely believed that hyperelliptic curve
cryptosystems (HECC) carry a substantial performance penalty compared to elliptic curve cryptosystems (E...
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
Chosen-ciphertext security Public-key encryption key encapsulation
2008/9/17
We propose a practical key encapsulation mechanism with a simple and intuitive design con-
cept. Security against chosen-ciphertext attacks can be proved in the standard model under a new assumption,...
Filling the Gap between Voters and Cryptography in e-Voting
electronic voting homomorphic commitment homomorphic encryption
2008/8/18
Cryptography is an important tool in the design and implementation of electronic voting schemes for it provides the property of verifiability, which is not provided in the traditional voting. But in t...