搜索结果: 1-9 共查到“军事学 Failures”相关记录9条 . 查询时间(0.015 秒)
On the impact of decryption failures on the security of LWE/LWR based schemes
Lattice cryptography Post-quantum cryptography Decryption failures
2018/11/12
In this paper we investigate the impact of decryption failures on the chosen-ciphertext security of (Ring/Module)-Learning With Errors and (Ring/Module)-Learning with Rounding based primitives. Our an...
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
hedged security nonce-based public-key encryption deterministic public-key encryption
2018/1/11
Nowadays it is well known that randomness may fail due to bugs or deliberate randomness subversion. As a result, the security of traditional public-key encryption (PKE) cannot be guaranteed any more. ...
Selective-Opening Security in the Presence of Randomness Failures
selective-opening security deterministic encryption nonce-based PKE
2016/12/9
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in
the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
Functional Encryption Adaptive Security Inner-Product
2016/1/27
The SimpleMatrix encryption scheme as proposed by Tao et
al. [16] is one of the very few existing approaches to create a secure and ef-
ficient encryption scheme on the basis of multivariate polynom...
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
privacy imessage instant messaging
2016/1/25
Instant messaging services are quickly becoming the most dominant form of communication among consumers around the world. Apple iMessage, for example, handles over 2 billion message each day, while Wh...
Rogue Decryption Failures: Reconciling AE Robustness Notions
provable security authenticated encryption multiple errors
2015/12/23
An authenticated encryption scheme is deemed secure (AE)
if ciphertexts both look like random bitstrings and are unforgeable. AE is
a much stronger notion than the traditional IND–CCA. One shortcomi...
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Internet security CA compromise
2014/3/13
The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issu...
On Symmetric Encryption with Distinguishable Decryption Failures
cryptographic practice implementation
2014/3/11
We propose to relax the assumption that decryption failures are indistinguishable in security models for symmetric encryption. Our main purpose is to build models that better reflect the reality of cr...
We consider the impact of the possibility of decryption failures in proofs of security for
padding schemes, where these failures are both message and key dependent. We explain that
an average case f...