搜索结果: 1-4 共查到“军事学 keeping”相关记录4条 . 查询时间(0.098 秒)
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points
CSIDH post-quantum cryptography Isogeny-based cryptography
2019/4/3
At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptograp...
A time-release protocol enables one to send secrets into a future release time. The main technical challenge lies in incorporating timing control into the protocol, especially in the absence of a cent...
Keeping or Losing Tiny-Error Correctness of Cryptosystems Implemented by Secure Pseudorandom Generators
foundations implementation pseudo-randomness
2018/8/2
Randomness is essential but expensive resource for cryptography, and secure (and efficient) implementations of randomness using pseudorandom generators (PRGs) are much concerned in this area. On the o...
Keeping Denial-of-Service Attackers in the Dark
Denial-of-Service Port hopping Secure two-party communication
2009/3/2
We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic
adversaries that have knowledge of their attack’s successfulness, e.g., by observing service performan...