搜索结果: 1-15 共查到“密码学 Estimation”相关记录21条 . 查询时间(0.265 秒)
Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions
Boolean Functions Nonlinearity Linearized Polynomial Root Number
2018/12/3
To determine the dimension of null space of any given linearized polynomial is one of vital problems in finite field theory, with concern to design of modern symmetric cryptosystems. But, the known ge...
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
public-key cryptography lattice techniques
2018/11/19
The lattice basis reduction algorithm is a method for solving the Shortest Vector Problem (SVP) on lattices. There are many variants of the lattice basis reduction algorithm such as LLL, BKZ, and RSR....
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Side Channel Rank Estimation Key Enumeration
2018/11/13
Rank estimation is an important tool for a side-channel evaluations laboratories. It allows estimating the remaining security after an attack has been performed, quantified as the time complexity and ...
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
TRNG ring oscillator jitter
2018/11/6
Ring oscillator-based true random number generators (RO-based TRNGs) are widely used to provide unpredictable random numbers for cryptographic systems. The unpredictability of the output numbers, whic...
PRank: Fast Analytical Rank Estimation via Pareto Distributions
rank estimation side-channel
2018/6/5
These estimations are particularly useful where the key is not reachable with exhaustive search. We propose a new method called PRank for rank estimation, that is conceptually simple, and more time an...
Error Estimation of Practical Convolution Discrete Gaussian Sampling
Discrete Gaussian Sampling convolution theorem lattice
2018/4/4
Discrete Gaussian Sampling is a fundamental tool in lattice cryptography which has been used in digital signatures, identify-based encryption, attribute-based encryption, zero-knowledge proof and full...
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
Side-channel analysis Evaluation Security assessment
2018/3/6
Evaluation of security margins after a side-channel attack is an important step of side-channel resistance evaluation. The security margin indicates the brute force effort needed to recover the key gi...
Several access control systems are based on the users’ physical location/proximity to the access point. Distance- Bounding (DB) protocols constitute a classical solution to calculate the distance betw...
Renyi Entropy Estimation Revisited
Renyi Entropy Estimation Renyi Entropy Sample Complexity
2017/6/22
We revisit the problem of estimating entropy of discrete distributions from independent samples, studied recently by Acharya, Orlitsky, Suresh and Tyagi (SODA 2015), improving their upper and lower bo...
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
learning with errors hardness estimation lattice-based cryptography
2017/2/21
Lattice-based cryptography is a promising candidate to build cryptographic primitives that are secure against quantum algorithms. The Learning with Errors problem is one of the most important hardness...
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection
Entropy Estimators Collision Entropy Anomaly Detection
2016/12/7
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection.
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
side-channel analysis MI PI
2016/7/22
The accuracy and the fast convergence of a leakage model are both essential components for the efficiency of side-channel analysis. Thus for efficient leakage estimation an evaluator is requested to p...
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach
Key enumeration Key rank side-channel analysis
2016/6/6
The main contribution of this paper, is a new key enumeration algorithm that combines the conceptual simplicity of the rank estimation algorithm of Glowacz et al. (from FSE 2015) and the parallelizabi...
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
side channel evaluations key rank
2016/5/23
Quantifying the side channel security of implementations has been a significant research question for several years in academia but also among real world side channel practitioners. As part of securit...
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
Lattice basis reduction, progressive BKZ Gram-Schmidt orthogonal basis geometric series assumption
2016/2/23
In this paper, we investigate a variant of the BKZ algorithm,
called progressive BKZ, which performs BKZ reductions by starting with
a small blocksize and gradually switching to larger blocks as the...