搜索结果: 1-8 共查到“军事学 Filter”相关记录8条 . 查询时间(0.078 秒)
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Filter Permutator FLIP Homomorphic Encryption
2019/5/14
Motivated by the application of delegating computation, we revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorph...
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
Bloom filter encryption Bloom filter 0-RTT
2018/3/5
Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-...
Obfuscation of Bloom Filter Queries from Ring-LWE
obfuscation virtual black-box Bloom filters
2017/5/25
We devise a virtual black-box (VBB) obfuscator for querying whether set elements are stored within Bloom filters, with security based on the Ring Learning With Errors (RLWE) problem and strongly unive...
Attacks against Filter Generators Exploiting Monomial Mappings
Stream ciphers correlation attacks LFSR
2016/4/18
Filter generators are vulnerable to several attacks which have led to well-known design criteria on the Boolean filtering function. However, R鴑jom and Cid have observed that a change of the primitive ...
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Public-key encryption leakage-resilience
2014/3/7
We present a new generic construction of a public-key encryption (PKE) scheme secure against leakage-resilient chosen-ciphertext attacks (LR-CCA), from any Hash Proof System (HPS) and any one-time los...
Bias in the nonlinear filter generator output sequence
Bias nonlinear filter generator output sequence
2010/3/16
Nonlinear filter generators are common components used in
the keystream generators for stream ciphers and more recently for authentication
mechanisms. They consist of a Linear Feedback Shift Registe...
Local Affinity Based Inversion of Filter Generators
Boolean function filter generator local affinity property
2009/6/5
We propose a novel efficient cryptanalytic technique allowing an adversary to
recover an initial state of filter generator given its output sequence. The technique
is applicable to filter generators...
Attacks based on Conditional Correlations against the Nonlinear Filter Generator
stream ciphers keystream generator nonlinear filter generator
2009/4/8
In this paper we extend the conditional correlation attack
([LCPP96]) against the nonlinear filter generator (NLFG) by introduc-
ing new conditions and generalisations and present two known-plaintex...