搜索结果: 1-10 共查到“知识库 军事学 optimality”相关记录10条 . 查询时间(0.015 秒)
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Coppersmith's method lattices polynomial congruences
2016/12/9
We draw a new connection between Coppersmith's method for finding small solutions to polynomial congruences modulo integers and the capacity theory of adelic subsets of algebraic curves. Coppersmith's...
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
symmetric searchable encryption provable security secret-key cryptography
2016/1/27
Symmetric Searchable Encryption (SSE) is a very efficient and practical way for data owners to outsource
storage of a database to a server while providing privacy guarantees. Such SSE schemes enable
...
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
indistinguishability proofs conditional equivalence random systems
2016/1/23
Most cryptographic security proofs require showing that two systems are indistinguishable. A central tool in such proofs is that of a game, where winning the game means provoking a certain condition...
On the Optimality of Differential Fault Analyses on CLEFIA
CLEFIA Differential Fault Analysis Fault Attack
2016/1/8
Differential Fault Analysis is a powerful cryptanalytic tool to reveal secret keys of cryptographic algorithms. By corrupting the computation of an algorithm, an attacker gets additional information a...
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Cryptographic protocols secure multi-party computation fairness
2016/1/3
In his seminal result, Cleve [STOC’86] established that secure distributed computation—
guaranteeing fairness—is impossible in the presence of dishonest majorities. A generous number
of proposals fo...
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
XLS CMC Luby-Rackof
2015/12/31
It is well known that three and four rounds of balanced Feistel
cipher or Luby-Rackoff (LR) encryption for two blocks messages are
pseudorandom permutation (PRP) and strong pseudorandom permutation
...
A note on the optimality of frequency analysis vs. ℓp-optimization
Property-Preserving Encrypted Databases
2015/12/18
Naveed, Kamara, and Wright’s recent paper “Inference Attacks on Property-Preserving Encrypted
Databases” (ACM-CCS 2015) evaluated four attacks on encrypted databases, such as those based
on the desi...
Towards Leakage Exploitation Rate Optimality in Template Attack
Cryptography Side-Channel Attacks
2014/3/7
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of the targeted crypto devices and thus be well capa...
Redundant -adic Expansions II:Non-Optimality and Chaotic Behaviour
adic Expansions II Non-Optimality Chaotic Behaviour
2009/6/3
When computing scalar multiples on Koblitz curves, the Frobenius
endomorphism can be used to replace the usual doublings on the curve. This
involves digital expansions of the scalar to the complex b...
On the Optimality of Linear, Differential and Sequential Distinguishers
Distinguishers Statistical Hypothesis Testing Linear Cryptanalysis Differential cryptanalysis
2009/4/8
In this paper, we consider the statistical decision processes
behind a linear and a differential cryptanalysis. By applying techniques
and concepts of statistical hypothesis testing, we describe pre...