搜索结果: 1-8 共查到“军队指挥学 computational security”相关记录8条 . 查询时间(0.062 秒)
Composable and Finite Computational Security of Quantum Message Transmission
Quantum cryptography composable security computational security
2019/8/14
Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the li...
Computational Security of Quantum Encryption
quantum encryption quantum cryptography quantum indistinguishability
2016/5/3
Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security o...
Analysis of Key Wrapping APIs: Generic Policies, Computational Security
key management key wrapping cryptographic APIs
2016/5/3
We present an analysis of key wrapping APIs with
generic policies. We prove that certain minimal conditions on
policies are sufficient for keys to be indistinguishable from
random in any execution ...
Modeling Computational Security in Long-Lived Systems, Version 2
Modeling Computational Security Long-Lived Systems cryptographic services
2009/6/10
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited
computational power. This type of security degrades progressively over the lifetime of a pro...
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
Key-Uncertainty of Quantum Ciphers Computational Security One-way Quantum Transmission
2009/3/27
We consider the scenario where Alice wants to send a se-
cret (classical) n-bit message to Bob using a classical key, and where
only one-way transmission from Alice to Bob is possible. In this case,...
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
Generic signature schemes short signatures provable security
2009/3/27
The object of this paper is the concrete security of recent
multivariate signature schemes. A major challenge is to reconcile some
”tricky” ad-hoc constructions that allow to make short signatures, ...
Inductive Trace Properties for Computational Security
Inductive Trace Properties Computational Security
2009/1/9
Protocol authentication properties are generally trace-based,
meaning that authentication holds for the protocol if authentication
holds for individual traces (runs of the protocol and adversary). C...
Modeling Computational Security in Long-Lived Systems
Modeling Computational Security Long-Lived Systems
2008/5/23
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a prot...