搜索结果: 1-12 共查到“军事学 possible”相关记录12条 . 查询时间(0.14 秒)
We reconsider the security guarantee that can be achieved by general protocols for secure multiparty computation in the most basic of settings: information-theoretic security against a semi-honest adv...
When are Continuous-Source Fuzzy Extractors Possible?
fuzzy extractors secure sketches information-theory
2018/5/22
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy source into the same uniformly distributed key. The ideal functionality of a fuzzy extractor outputs t...
This work exposes further vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs targeting AES running in the victim VM. Even though there exists a ri...
Another Tor is possible
Tor cryptography privacy
2016/1/6
The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity
and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, whil...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy
secret into the same uniformly distributed key. A minimum condition for the security of the key is th...
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
discrete logarithm problem index calculus algebraic curves
2016/1/5
The function field sieve, a subexponential algorithm of complexity L(1/3) that
computes discrete logarithms in finite fields, has recently been improved to an algorithm of
complexity L(1/4) and subs...
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Orbit rotation symmetric function Walsh transform
2015/12/30
In the literature, few constructions of n-variable rotation symmetric bent functions have been presented,
which either have restriction on n or have algebraic degree no more than 4. In this paper, fo...
Practical Key-recovery For All Possible Parameters of SFLASH
public-key cryptography / SFLASH multivariate cryptography practical cryptanalysis key-recovery
2012/3/28
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older $C^*$ encryption and signature scheme that was broken in 1995 by Patari...
Practical Key-recovery For All Possible Parameters of SFLASH
public-key cryptography SFLASH multivariate cryptography practical cryptanalysis key-recovery
2011/6/9
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older $C^*$ encryption and signature scheme that was broken in 1995 by Patari...
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
Algebraic Attack Algebraic Degree Algebraic Immunity
2009/3/19
This paper gives a construction method which can get a large
class of Boolean functions with maximum algebraic immunity(AI) from
one such giving function. Our constructions get more functions than a...
Is it possible to have CBE from CL-PKE?
Cryptography Security analysis Certi¯ cateless Public Key Encryption
2009/3/18
Recently, Al-Riyami and Paterson proposed a generic con-
version from CL-PKE (Certificateless Public Key Encryption) to CBE
(Certificate Based Encryption) and claimed that the derived CBE scheme
is...
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Algebraic Attack Algebraic Degree Algebraic Immunity Annihilator
2009/2/18
So far there is no systematic attempt to construct Boolean functions with maximum
annihilator immunity. In this paper we present a construction keeping in mind
the basic theory of annihilator immuni...