搜索结果: 1-7 共查到“知识库 军事学 2017”相关记录7条 . 查询时间(0.424 秒)
At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields, to be used in secure masking schemes. To date, these algorithms have the lowest known complex...
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
post-quantum cryptography multivariate public-key cryptography chosen message attack
2018/4/4
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the multivariate quadratic polynomial (MQ) problem. ELSA, a new multivariate signature scheme proposed at ...
Secure top most significant genome variants search: iDASH 2017 competition
genome variants search private genomic data IDASH competition
2018/4/4
One of the 3 tracks of iDASH Privacy & Security Workshop 2017 competition was to execute a whole genome variants search on private genomic data. Particularly, the search application was to find the to...
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
secret sharing multiplicative verifiability
2018/1/27
In this paper, we point out flaws in an existing verifiably multiplicative secret sharing (VMSS) scheme. Namely, we show that a scheme proposed by Yoshida and Obana presented at ICITS 2017 is insecure...
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Public-Key Encryption Indeterminate Equations Cryptosystem Post-quantum cryptography
2017/12/25
Abstract. We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosystem (IEC), introduced by Akiyama, Goto, Okumura, Takagi, Nuida, and Hanaoka at SAC 2017 as ...
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
Multivariate Cryptography Fully Homomorphic Encryption Eprint 2017/458
2017/5/31
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.