搜索结果: 31-45 共查到“知识库 计算机处理器技术”相关记录251条 . 查询时间(1.748 秒)
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
improved efficiency pseudorandom functions
2015/8/5
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor-Reingold algebraic PRF. Our PRF is the result of adapting the cascade construction, which is the basi...
Lattice basis delegation in fixed dimension and shorter ciphertext hierarchical IBE
ciphertext hierarchical IBE fixed dimensio
2015/8/5
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchica...
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in the construction is...
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey its implementation in ...
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry ou...
FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD
ORDER ORDINARY ELLIPTIC CURVES COCKS-PINCH METHOD
2015/8/5
We apply the Cocks-Pinch method to obtain pairing-friendly composite order groups with prescribed embedding degree associated to ordinary
elliptic curves, and we show that new security issues arise i...
XCS: cross channel scripting and its impact on web applications
web applications channel scripting
2015/8/5
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
XCS: cross channel scripting and its impact on web applications
web applications channel scripting
2015/8/5
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
Ensuring High-Quality Randomness in Cryptographic Key Generation
Cryptographic Key Generation High-Quality Randomness
2015/8/5
The security of any cryptosystem relies on the secrecy of the system's secret keys. Yet, recent experimental work demonstrates that tens of thousands of devices on the Internet use RSA and DSA secrets...
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as so...
The most dangerous code in the world: validating SSL certificates in non-browser software
non-browser software validating SSL
2015/8/5
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. Security of SSL connections against an active network attacker depends on correctly validating public-key certif...
Who Killed My Battery: Analyzing Mobile Browser Energy Consumption
Energy Consumption Killed My Battery
2015/8/5
Despite the growing popularity of mobile web browsing, the energy consumed by a phone browser while surfing the web is poorly understood. We present an infrastructure for measuring the precise energy ...
Targeted malleability: homomorphic encryption for restricted computations
restricted computations homomorphic encryption
2015/8/5
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perform on encrypted data...
The Online Certificate Status Protocol (OCSP) is as good as dead. It imposes a massive performance penalty on web traffic and has failed to mitigate the recent high-profile certificate security breach...
The case for prefetching and prevalidating TLS server certificates
TLS server certificates prefetching
2015/8/5
A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before a secure connection can be established. We propose a mechanism by which a browser can prefetch ...