搜索结果: 211-225 共查到“知识库 军事学”相关记录15042条 . 查询时间(2.854 秒)
Homomorphic Encryption is a breakthrough technology which can enable private cloud storage and computation solutions, and many applications have been described in the literature in the last few years....
Security analysis of two lightweight certificateless signature schemes
Certificateless cryptography Cryptanalysis Signature
2019/8/19
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC). Th...
Experience shows that most researchers and developers tend to treat plain-domains (those that are not prefixed with “www” sub-domains, e.g. “example.com”) as synonyms for their equivalent www-domains ...
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
proof of stake blockchain UC model
2019/8/19
Ouroboros Praos is a proof of stake based blockchain protocol. One of its security assumptions is parties are synchronized i.e., all of them knows when the protocol passes a new state. However, it is ...
滑石片战斗:八路军伏击战的典范
滑石片战斗 八路军 伏击战 典范
2019/10/8
1938年11月3~4日,八路军第120师第358旅第716团在山西省五台县滑石片地区设伏,歼灭日军第109师团第135联队蚋野大队500余人,俘敌20余人,缴获小炮4门、山炮2门、机枪30余挺、步枪340余支、战马100余匹和大量军需物资。第716团牺牲干部4 人、战士17人,伤干部15人、战士62人,以完全劣势的武器装备歼灭日军一个装备精良的大队,仅20余敌逃出伏击圈,大部被我714团歼灭。滑...
2019年8月3日,美国国防部长马克·埃斯珀声称,美有意在亚洲部署中程导弹。此前一天,美国正式退出《中导条约》,美国国防部表示将全面研发此前受条约限制的陆基常规中程导弹。美国执意退约,谋求绝对军事优势的单边主义举动,不仅严重影响全球战略平衡与稳定,令全球军控处于危险边缘,最终也将损害自身利益。
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
puncturable encryption forward secrecy distributed setting
2019/8/14
Managing sensitive data in highly-distributed environments is gaining a lot of attention recently. Often, once data is presented to such environments, this data is persistent there. Being able to "for...
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Pre- and Post-Quantum Cryptography Scalable One-Time Pad (S-OTP) Information Conservational Security (ICS)
2019/8/14
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
Composable and Finite Computational Security of Quantum Message Transmission
Quantum cryptography composable security computational security
2019/8/14
Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the li...
Abstract. The extremely efficient Rabin-Williams signature scheme relies on decryption of a quadratic equation in order to retrieve the original message. Customarily, square roots are found using the ...
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Searchable Symmetric Encryption Multi-owner Ranked Search
2019/8/14
Searchable symmetric encryption (SSE) for multi-owner model draws much attention as it enables data users to perform searches over encrypted cloud data outsourced by data owners. However, implementing...
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Lattices Identity-based encryption Revocation
2019/8/14
As an extension of identity-based encryption (IBE), revocable hierarchical IBE (RHIBE) supports both key revocation and key delegation simultaneously, which are two important functionalities for crypt...
Logic encryption, a method to lock a circuit from unauthorized use unless the correct key is provided, is the most important technique in hardware IP protection. However, with the discovery of the SAT...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Related-Key Differential Slide Attack Against Fountain V1
lightweight cryptography Fountain slide attacks
2019/8/14
The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization process. In this paper we introduce a slide attack that leads to the con...