搜索结果: 1-13 共查到“知识库 军事学 Exploring how”相关记录13条 . 查询时间(0.125 秒)
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Post-Quantum Cryptography Lightweight cryptography Permutation-Based Cryptography
2019/6/12
Most NIST Post-Quantum Cryptography (PQC) candidate algorithms use symmetric primitives internally for various purposes such as ``seed expansion'' and CPA to CCA transforms. Such auxiliary symmetric o...
Exploring Constructions of Compact NIZKs from Various Assumptions
non-interactive zero-knowledge pairing homomorphic equivocal commitment
2019/6/4
A non-interactive zero-knowledge (NIZK) protocol allows a prover to non-interactively convince a verifier of the truth of the statement without leaking any other information. In this study, we explore...
As of 12th January 2019, Monero is ranked as the first privacy-preserving cryptocurrency by market capitalization, and the 14th among all cryptocurrencies. This paper aims at improving the understandi...
Pseudorandom functions (PRFs) are one of the fundamental building blocks in cryptography. We explore a new space of plausible PRF candidates that are obtained by mixing linear functions over different...
In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-...
Given this scheme's algebraic structure it is interesting to systematically explore its variants and generalizations. In particular it might be useful to enhance NS with features such as semantic secu...
The Internet of Things (IoT) has become a reality: small connected devices feature in everyday objects including childrens' toys, TVs, fridges, heating control units, etc. Supply chains feature sensor...
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
side-channel analysis power analysis single trace attacks
2016/1/3
This paper compares attack outcomes w.r.t. profiled single trace attacks of four different lightweight ciphers in order to investigate which of their properties, if any, contribute to attack success. ...
Exploring Energy Efficiency of Lightweight Block Ciphers
AES Lightweight Block Cipher Low Power/Energy Circuits.
2015/12/23
In the last few years, the field of lightweight cryptography
has seen an influx in the number of block ciphers and hash functions
being proposed. One of the metrics that define a good lightweight de...
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
multi-party computation universal composition secure function evaluation trusted common randomness frontier analysis
2011/1/12
In 2-party secure computation, access to common, trusted randomness is a fundamental primitive. It is widely employed in the setting of computationally bounded players (under various complexity assump...
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
foundations / multi-party computation universal composition secure function evaluation trusted common randomness frontier analysis
2012/3/30
In 2-party secure computation, access to common, trusted randomness is a fundamental primitive. It is widely employed in the setting of computationally bounded players (under various complexity assump...
Further Improved Differential Fault Attacks on Camellia by Exploring Fault Width and Depth
Differential fault analysis Feistel structure SPN structure
2010/2/1
This paper presents several further improved attacks on Camellia. In Jan 2009, ZHOU Yongbin proposes a DFA attack on Camellia by injecting 1 byte fault into the rth round left register to recover 1 Kr...
Exploring Cipherspace:Combining stream ciphers and block ciphers
Exploring Cipherspace Combining stream ciphers block ciphers
2009/6/10
This paper looks at the possibility of combining a block
cipher and a stream cipher to get a strong hybrid cipher. It
includes two specific proposals for combining AES-128 and
RC4-128 to get a ciph...