搜索结果: 1-11 共查到“军事学 support”相关记录11条 . 查询时间(0.125 秒)
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Post-Quantum Cryptography Lightweight cryptography Permutation-Based Cryptography
2019/6/12
Most NIST Post-Quantum Cryptography (PQC) candidate algorithms use symmetric primitives internally for various purposes such as ``seed expansion'' and CPA to CCA transforms. Such auxiliary symmetric o...
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
The U.S. Military in Support of Strategic Objectives in Latin America and the Caribbean
U.S. Military Latin America and the Caribbean Strategic Objectives
2019/10/11
Since the end of the Cold War, Latin America and the Caribbean have received a relatively minimal portion of personnel and resources allocated globally by the U.S. military.1 Such allocations are unde...
Image Classification using non-linear Support Vector Machines on Encrypted Data
cryptographic protocols SHE
2017/9/13
In image processing, algorithms for object classification are typically based around machine learning. From the algorithm developer's perspective, these can involve a considerable amount of effort and...
Full-State Keyed Duplex With Built-In Multi-User Support
Duplex construction full-state distinguishing bounds
2017/6/2
The keyed duplex construction was introduced by Bertoni et al.(SAC 2011) and recently generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a generalization of the full-st...
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries
cloud storage searchable encryption non-interaction
2016/12/7
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the RSA-function,
...
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
privacy-preserving private data
2016/7/29
Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacy-preserving classific...
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
Encrypted search privacy implementation
2013/4/18
This work presents the design, analysis and implementation of the first sub-linear searchable symmetric encryption (SSE) protocol that supports conjunctive search and general Boolean queries on symmet...
Optimized Public Key Infrastructure A PKI to Support Efficient Document’s Signatures
Optimized certificates certification authority
2009/6/12
Optimized Public Key Infrastructures are traditional PKI
in which end users may optimize the signatures of their
documents, replacing the signer’s validation data with Optimized
Certificates (OC). ...
Cryptographically Private Support Vector Machines
Privacy Preserving Data Mining Kernel Methods
2008/11/27
We study the problem of private classification using kernel methods.
More specifically, we propose private protocols implementing the Kernel Adatron
and Kernel Perceptron learning algorithms, give p...
USDA PARTNERS WITH ARMY AND AIR FORCE TO SUPPORT 4-H PROGRAMS FOR MILITARY YOUTH
Army Air Force 4-H clubs military installations
2006/12/4