搜索结果: 1-3 共查到“军事学 Continual Leakage”相关记录3条 . 查询时间(0.062 秒)
Forward-Security under Continual Leakage
leakage-resilient cryptography forward security digital signatures
2017/5/31
Current signature and encryption schemes secure against continual leakage fail completely if the key in any time period is fully exposed. We suggest forward security as a second line of defense, so th...
Deterministic Public-Key Encryption under Continual Leakage
Deterministic Encryption Continual Leakage Searchable Encryption
2016/1/6
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO
2007), is an important technique for searchable encryption; it allows quick, logarithmic-time,
search over ...
Signatures Resilient to Continual Leakage on Memory and Computation
digital signatures leakage resilience public-key cryptography
2010/10/14
Recent breakthrough results by Brakerski et al and Dodis et al have shown that signature schemes can be made secure even if the adversary continually obtains information leakage from the secret key of...