搜索结果: 1-15 共查到“军事学 the noise”相关记录36条 . 查询时间(0.406 秒)
Homomorphic noise growth in practice: comparing BGV and FV
Fully Homomorphic Encryption Lattice Cryptography Public-Key Encryption
2019/5/21
The purpose of this paper is to provide a comprehensive analysis and side-by-side comparison of the noise growth behaviour in the BGV and FV somewhat homomorphic encryption schemes, both heuristically...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
nQUIC: Noise-Based QUIC Packet Protection
UDP QUIC SSL
2019/1/16
We present nQUIC, a variant of QUIC-TLS that uses the Noise protocol framework for its key exchange and basis of its packet protector with no semantic transport changes. nQUIC is designed for deployme...
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Side-channel analysis Convolutional Neural Networks Machine learning
2018/11/2
Profiled side-channel attacks based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that ...
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
formal verification noise protocol framework cryptographic protocols
2018/8/21
The Noise Protocol Framework, introduced recently, allows for the design and construction of secure channel protocols by describing them through a simple, restricted language from which complex key de...
Security proof for Quantum Key Recycling with noise
quantum cryptography quantum key recycling
2018/3/13
Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. We consider QKR protocols where classical information is embedded in qubit states. A pa...
Learning Parity with Noise Implies Collision Resistant Hashing
Learning Parity with Noise Collision Resistant Hashing binary Shortest Vector Problem
2018/1/2
In addition to the feasibility established, we discuss also the practical relevance of the CRH functions constructed (from the hardness of LPN). Interestingly, the SHA-3 proposal Fast Syndrome Based (...
In this work, we abstract some key ingredients in previous key exchange protocols based on LWE and its variants, by introducing and formalizing the building tool, referred to as key consensus (KC) and...
Distributed Computing with Channel Noise
interactive communication information theoretic security
2017/7/26
A group of nn users want to run a distributed protocol ππ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows ππ, is able to malicious...
Noise Distributions in Homomorphic Ring-LWE
Ring Learning with Errors Subgaussian Random Variable Homomorphic Encryption
2017/7/24
We develop a statistical framework to analyse the Ring-LWE processes of A Toolkit for Ring-LWE Cryptography (Eurocrypt 2013) and similar processes. We consider the δδ-subgaussian random variables used...
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
Physically Unclonable Functions Boolean Analysis Noise Sensitivity
2017/6/9
Along with the evolution of Physically Unclonable Functions (PUFs) as a remedy for the shortcomings of conventional key storage and generation methods, numerous successful attacks against PUFs have be...
KDM-Secure Public-Key Encryption from Constant-Noise LPN
learning parity with noise key-dependent message security public-key encryption
2017/4/12
The Learning Parity with Noise (LPN) problem has found many applications in cryptography due to its conjectured post-quantum hardness and simple algebraic structure. Over the years, constructions of d...
We propose a Somewhat Homomorphic Encryption (SHE) scheme based on the Learning With Rounding (LWR) problem. The LWR problem is somewhat similar to the more classical Learning With Errors (LWE) and wa...
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
cryptanalysis RSA
2016/12/7
From the proposal of key-recovery algorithms for RSA secret key from its noisy version at Crypto2009, there have been considerable researches on RSA key recovery from discrete noise. At CHES2014, two ...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if the computation on the encoded values results in a zero. Encodings in known candidate constructions...