搜索结果: 1-15 共查到“知识库 军事学 source”相关记录17条 . 查询时间(0.122 秒)
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Side-Channel Attacks Security Evaluations Certification
2019/9/16
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS d...
Side-channel attacks rely on the fact that the physical behavior of a device depends on the data it manipulates. We show in this paper how to use this class of attacks to break the security of some cr...
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Randomness Extractors Non-Malleability
2019/3/4
In this paper, we consider the setting where a party uses correlated random tapes across multiple executions of a cryptographic algorithm. We ask if the security properties could still be preserved in...
When are Continuous-Source Fuzzy Extractors Possible?
fuzzy extractors secure sketches information-theory
2018/5/22
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy source into the same uniformly distributed key. The ideal functionality of a fuzzy extractor outputs t...
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
side-channel analysis signal processing filtering
2016/3/23
Singular Spectrum Analysis (SSA) is a powerful data decomposition/recomposition technique that can be used to reduce the noise in time series. Compared to existing solutions aiming at similar purposes...
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
side-channel analysis acquisition synchronization
2016/1/25
This paper introduces a complete side channel analysis toolbox, inclusive of the analog capture hardware, target device, capture software, and analysis software. The highly modular design allows use o...
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Searchable Symmetric Encryption Multiple Data Sources Data Outsourcing
2015/12/31
Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other
advantages. Subsequent privacy risks force data owners to encrypt sensitive...
Achieving Differential Privacy with Bias-Control Limited Source
differential privacy imperfect randomness Bias-Control Limited source
2015/12/31
In the design of differentially private mechanisms, it’s usually
assumed that a uniformly random source is available. However, in many
situations it seems unrealistic, and one must deal with various...
We formalize the use of Bitcoin as a source of publiclyverifiable
randomness. As a side-effect of Bitcoin’s proof-of-work-based
consensus system, random values are broadcast every time new blocks
a...
We construct an efficient information-theoretically non-mall\-eable code in the split-state model for one-bit messages. Non-malleable codes were introduced recently by Dziembowski, Pietrzak and Wichs ...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
Cryptographically Sound Security Proof On-Demand Source Routing Protocol EndairA
2011/3/11
We present the first cryptographically sound security proof of a routing
protocol for mobile ad-hoc networks. More precisely, we show that the route
discovery protocol does not output a non-existing...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
cryptographic protocols
2012/3/29
We present the first cryptographically sound security proof of a routing protocol for mobile ad-hoc networks. More precisely, we show that the route discovery protocol does not output a non-existing p...
Signatures for Multi-source Network Coding
public-key cryptography network coding pollution attack homomorphic signatures
2010/7/13
We consider the problem of securing inter-flow network coding with multiple sources. We present a practical homomorphic signature scheme that makes possible to verify network coded packets composed of...
A provably secure really source hiding designated verifier signature scheme based on random oracle model
DVS secure hash functions random oracle
2009/7/22
A lot of designated verifier signature (DVS) schemes have been proposed. However, all of them only provide the basic security requirement that only the designated verifier can check the validity of th...
The multi-path routing scheme provides reliable guarantee for mobile ad hoc network. A new method is
proposed that is using to analyze the security of multi-path routing protocol within the framework...