搜索结果: 1-15 共查到“军事学 Challenges”相关记录17条 . 查询时间(0.046 秒)
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Machine learning side channels SAT solver
2019/2/27
Alongside CHES 2018 the side channel contest 'Deep learning vs. classic profiling' was held. Our team won both AES challenges (masked AES implementation), working under the handle AGSJWS. Here we desc...
Security Challenges of the New Colombian Administration
Security Challenges Colombian Administration IvánDuque Increased Drug Production
2019/10/11
Colombia faces one of the most complex security situations in its recent history, as it is simultaneously confronted by four intertwined security challenges—increased drug production, increased organi...
Building Militaries in Fragile States: Challenges for the United States (Book Review)
Building Militaries the United States Iraq BWT
2019/10/11
After more than a decade of supporting large expeditionary forces in Iraq and Afghanistan, the U.S. battle cry today is “by, with, and through” (BWT). According to General Joseph Votel, Commander U.S....
Examining Complex Forms of Conflict: Gray Zone and Hybrid Challenges
Conflict Gray Zone Hybrid Challenges Defining Hybrid Warfare
2019/10/11
The Joint Force, and the national security community as a whole, must be ready and able to respond to numerous challenges across the full spectrum of conflict including complex operations during peace...
Ransomware has become one of the major threats nowadays due to its huge impact and increased rate of infections around the world. CryptoWall 3, was responsible for damages of over 325 millions of doll...
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
lattices learning with errors LWE
2017/6/27
Practical hardness results are necessary to select parameters for cryptographic schemes. Cryptographic challenges proved to be useful for determining the practical hardness of computational problems t...
Privacy-preserving biometric authentication: challenges and directions
biometric authentication applications
2017/5/25
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a mean of authenticating people due to t...
Challenges for Ring-LWE
Ring-LWR challenges cryptanalysis
2016/12/10
As lattice cryptography becomes more widely used in practice, there is an increasing need for further cryptanalytic effort and higher-confidence security estimates for its underlying computational pro...
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
finite fields discrete logarithm problem tower number field sieve
2016/12/7
In the past two years there have been several advances in Number Field Sieve (NFS) algorithms for computing discrete logarithms in finite fields \fpn\fpn where pp is prime and n>1n>1 is a small intege...
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Identification protocols human identification protocols cryptography
2016/1/26
Cryptographic identification protocols enable a prover to prove its identity to a
verifier. A subclass of such protocols are shared-secret challenge-response identifi-
cation protocols in which the ...
Bitcoin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bitcoin grew to comprise billions of dollars of economic value, even while t...
Cryptography Challenges for Computational Privacy in Public Clouds
applications implementation computational privacy
2014/3/13
Computational privacy is a property of cryptographic system that ensures the privacy of data (and/or operations) while being processed at an untrusted server. Cryptography has been an indispensable to...
Towards Adoption of DNSSEC: Availability and Security Challenges
DNS security DNS cache poisoning
2014/3/13
DNSSEC deployment is long overdue; however, it seems to be finally taking off. Recent cache poisoning attacks motivate protecting DNS, with strong cryptography, rather than with challenge-response ‘de...
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
public-key cryptography / fully-homomorphic encryption cryptanalysis
2012/3/26
At EUROCRYPT '10, van Dijk, Gentry, Halevi and Vaikuntanathan presented simple fully-homomorphic encryption (FHE) schemes based on the hardness of approximate integer common divisors problems, which w...
Functional Encryption: Definitions and Challenges
Functional Encryption the concept security
2010/10/26
We initiate the formal study of functional encryption by giving precise definitions of the concept and its security. Roughly speaking, functional encryption supports restricted secret keys that enable...