搜索结果: 1-8 共查到“军队指挥学 redundancy”相关记录8条 . 查询时间(0.093 秒)
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
IRC Physical attacks Fault attacks
2017/9/25
A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or st...
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy
Fault attacks Fault resistance Intra-instruction redundancy
2016/12/10
Fault attack countermeasures can be implemented by storing or computing sensitive data in redundant form, such that the faulty data can be detected and restored. We present a class of lightweight, por...
Secure Certificateless Public Key Encryption without Redundancy
certificateless public key encryption redundancy short ciphertext
2009/6/10
Certificateless public key cryptography was introduced to
solve the key escrow problem in identity based cryptography while enjoying
the most attractive certificateless property. In this paper, we p...
Wang and Yu showed that MD5 was not collision-resistant, but it is known that their sufficient
conditions for finding a collision of MD5 includes some mistakes. In this paper, we examine the
suffici...
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
digital signature message recovery forgery attack one-way hash message redundancy
2008/9/10
Digital signature schemes based on public-key cryptosystems generally permit existential forgery, except the schemes are equipped with some message formatting mechanisms, such as using hash functions ...
一种不使用Hash和Redundancy函数的代理盲签名
不可链接性 代理盲签名 不可伪造性
2008/5/16
在密码学中,使用Hash函数和Redundancy函数必然使签名方案因这些函数的不安全性而遭受相关攻击,从而导致签名方案的安全性降低。提出了一种不使用Hash和Redundancy函数的代理盲签名,其安全性等价于解离散对数问题,而且避免了使用相关函数带来的威胁。分析表明,新方案实现了电子交易中的不可伪造性和不可链接性,有效防止了双方事后抵赖;而且减少了求幂运算的次数,避免了求Hash函数运算,使签...