搜索结果: 1-15 共查到“军事学 Models”相关记录60条 . 查询时间(0.25 秒)
We introduce stochastic sandpile models which imitate numerous aspects of the practical behavior of the LLL algorithm with compelling accuracy. In addition, we argue that the physics and mathematics o...
Contingent payments on a public ledger: models and reductions for automated verification
fair exchange security models blockchain
2019/5/9
We study protocols that rely on a public ledger infrastructure, concentrating on protocols for zero-knowledge contingent payment, whose security properties combine diverse notions of fairness and priv...
Homomorphic Training of 30,000 Logistic Regression Models
Approximate numbers Homomorphic encryption GWAS
2019/4/28
In this work, we demonstrate the use the CKKS homomorphic encryption scheme to train a large number of logistic regression models simultaneously, as needed to run a genome-wide association study (GWAS...
The Relationship between the Construction and Solution of the MILP Models and Applications
MILP Gurobi PRESENT
2019/1/26
The automatic search method based on Mix-integer Linear Programming (MILP) is one of the most common tools to search the distinguishers of block ciphers. For differential analysis, the byte-oriented M...
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
STP Differential trail Linear trail
2019/1/16
Automatic tools have played an important role in designing new cryptographic primitives and evaluating the security of ciphers. Simple Theorem Prover constraint solver (STP) has been used to search fo...
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Belief Propagation Factor Graphs AES
2018/7/16
We define a novel metric to capture the importance of variable nodes in factor graphs, we propose two improvements to the sum-product algorithm for the specific use case in side channel analysis, and ...
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models
MLP CNNs
2018/4/4
This paper proposes DeepSigns, a novel end-to-end framework for systematic Watermarking and Intellectual Property (IP) protection in the context of deep learning. DeepSigns, for the first time, introd...
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
Secret-Key Cryptography Generic Group Model Non-Uniformity
2018/3/5
The random-permutation model (RPM) and the ideal-cipher model (ICM) are idealized models that offer a simple and intuitive way to assess the conjectured standard-model security of many important symme...
The Complexity of Multiparty PSM Protocols and Related Models
Private Simultaneous Messages Protocols Secure Multi-Party Computation Conditional Disclosure of Secrets
2018/2/9
We study the efficiency of computing arbitrary k-argument functions in the Private Simultaneous Messages (PSM) model of (Feige et al. STOC'94, Ishai and Kushilevitz ISTCS'97). This question was recent...
Impossibility of Order-Revealing Encryption in Idealized Models
Black-box separations Order-revealing encryption Random oracle
2017/10/16
An Order-Revealing Encryption (ORE) scheme gives a public procedure by which two ciphertext can be compared to reveal the order of their underlying plaintexts. The ideal security notion for ORE is tha...
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models
secure computation black-box constructions
2017/9/28
We present a unified framework for obtaining black-box constructions of Universal Composable (UC) protocol in trusted setup models. Our result is analogous to the unified framework of Lin, Pass, and V...
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
Profiling Good Leakage Models For Masked Implementations
leakage certification HODPA masking
2017/7/6
Leakage model plays a very important role in side channel attacks. An accurate leakage model greatly improves the efficiency of attacks. However, how to profile a "good enough" leakage model, or how t...
On the Relation Between SIM and IND-RoR Security Models for PAKEs
Security Models SIM-based Security IND-based Security
2017/5/31
Password-based Authenticated Key-Exchange (PAKE) protocols allow users, who need only to share a password, to compute a high-entropy shared session key despite passwords being taken from a dictionary....
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Symmetric-key Cryptography Authenticated Encryption Online Encryption
2017/3/6
Real-world applications of authenticated encryption often require the encryption to be computable {online}, e.g. to compute the ithith block of ciphertext after having processed the first ii blocks of...