搜索结果: 1-13 共查到“军事学 build”相关记录13条 . 查询时间(0.094 秒)
How to leverage hardness of constant degree expanding polynomials over R to build iO
public-key cryptography Obfuscation
2019/9/16
In this work, we introduce and construct DD-restricted Functional Encryption (FE) for any constant D≥3D≥3, based only on the SXDH assumption over bilinear groups. This generalizes the notion of 33-res...
Pseudorandom functions are traditionally built upon block ciphers, but with the trend of permutation based cryptography, it is a natural question to investigate the design of pseudorandom functions fr...
How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
FE Indistinguishability Obfuscation
2018/11/6
DD -restricted FE allows for useful evaluation of constant-degree polynomials, while only requiring the SXDH assumption over bilinear groups. As such, it is a powerful tool for leveraging hardness tha...
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
tweakable blockcipher full security ideal blockcipher
2016/12/9
This paper focuses on building a tweakable blockcipher from a classical blockcipher whose input and output wires all have a size of nn bits. The main goal is to achieve full 2n2n security. Such a twea...
Time-lock encryption is a method to encrypt a message such that it can
only be decrypted after a certain deadline has passed. A computationally powerful
adversary should not be able to learn the mes...
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
distributed system applications of hash functions public-key infrastructure high availability
2014/3/5
Keyless Signatures Infrastructure (KSI) is a globally distributed system for providing time-stamping and server-supported digital signature services. Global per-second hash trees are created and their...
Use Data-depend Function Build Message Expansion Function
Message expansion function Data-depend function message modification
2012/6/14
We had found functions can be used to fix bits [2] by given differences. We use these functions build a message expansion function. In the message expansion function, there are some bits include messa...
Use Data-depend Function Build Message Expansion Function
Message expansion function Data-depend function message modification
2012/3/20
We had found functions can be used to fix bits [2] by given differences. We use these functions build a message expansion function. In the message expansion function, there are some bits include messa...
Build-in Determined Sub-key Correlation Power Analysis.
How to Build a Hash Function from any Collision-Resistant Function
Hash functions random oracle collision-resistance
2009/6/4
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the
use of provably collision-resistant (CR) functions in their place. Finding a collision in a provably
CR fun...
PECDSA.How to build a DL-based digital signature scheme with the best proven security
digital signature DSA variants idealized model proven security
2009/4/15
Many variants of the ElGamal signature scheme have been
proposed. The most famous is the DSA standard. If computing discrete
logarithms is hard, then some of these schemes have been proven secure
i...
On a(Flawed)Proposal to Build More Pairing-Friendly Curves
Flawed Proposal Pairing-Friendly Curves
2009/3/10
In a recent letter, Cui, Duan and Chan propose a generalisation of the
Scott-Barreto method to build a larger family of MNT curves, and they claim that
their proposal is also applicable to other cur...
How to Build a Low-Cost, Extended-Range RFID Skimmer
Low-Cost Extended-Range RFID Skimmer
2008/10/29
Radio-Frequency Identier (RFID) technology, using the ISO-14443 standard, is becoming increasingly
popular, with applications like credit-cards, national-ID cards, E-passports, and physical access
...