搜索结果: 1-8 共查到“军事学 Mitigating”相关记录8条 . 查询时间(0.046 秒)
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
deniability key management public-key cryptography
2019/4/22
Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access...
Mitigating the One-Use Restriction in Attribute-Based Encryption
attribute-based encryption one-use restriction
2018/7/9
We present a key-policy attribute-based encryption scheme that is adaptively secure under a static assumption and is not directly affected by an attribute "one-use restriction." Our construction impro...
Logic locking is a technique that's proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct...
Logic locking is a technique that has been proposed to protect
outsourced IC designs from piracy and counterfeiting by untrusted
foundries. A locked IC preserves the correct functionality only when ...
Mitigating Multi-Target Attacks in Hash-based Signatures
post-quantum cryptography hash-based signatures hash function security
2016/1/26
This work introduces XMSS-T, a new hash-based signature
scheme with tight security. Previous hash-based signature schemes are
facing a loss of security, linear in performance parameters like the tot...
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Password-Authenticated Key Exchange Distributed Computation Decision Diffie-Hellman
2015/12/21
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based
on a shared 揾uman-memorable?password without requiring a public-key infrastructure. It is one of the most...
Mitigating Dictionary Attacks on Password-Protected Local Storage
CAPTCHAs Passwords Puzzles Storage encryption
2008/12/12
We address the issue of encrypting data in local storage using a key that is derived from
the user’s password. The typical solution in use today is to derive the key from the password
using a crypto...
Mitigating Dictionary Attacks on Password-Protected Local Storage
CAPTCHAs Passwords Puzzles
2008/12/11
We address the issue of encrypting data in local storage using a key that is derived from
the user’s password. The typical solution in use today is to derive the key from the password
using a crypto...