搜索结果: 1-15 共查到“军事学 N II”相关记录31条 . 查询时间(0.174 秒)
Tropical cryptography II: extensions by homomorphisms
tropical cryptography public-key cryptography
2018/11/20
We use extensions of tropical algebras as platforms for very efficient public key exchange protocols.
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
MILP Generalized Feistel structure Switching mechanism
2018/8/16
Some features of Feistel structures have caused them to be considered as an efficient structure for design of block ciphers. Although several structures are proposed relied on Feistel structure, the t...
The Darkest Sides of Politics, II: State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime (Book Review)
State Terrorism Religious Extremism Organized Crime Weapons of Mass Destruction
2019/10/21
In this companion to his first volume on Postwar Facism, Covert Operations, and Terrorism, Jeffrey Bale explores the influence of some of the world’s most pressing security concerns through a rev...
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
blockchain technology dependable distributed computing systems
2016/12/12
Nowadays the decentralized transaction ledger functionality implemented through the blockchain technology is at the highest international interest because of the prospects both on opportunities and ri...
Bit Coincidence Mining Algorithm II
Elliptic Curve Discrete Logarithm Problem Elliptic Curve Cryptology
2016/12/8
In the former part of this manuscript, the author states the algorithm for the construction of equations system that ECDLP is reduced and in the latter part of this manuscript, the author state the id...
Another Look at Tightness II: Practical Issues in Cryptography
tightness complexity leveraging HMAC
2016/4/12
How to deal with large tightness gaps in security proofs is a vexing issue in
cryptography. Even when analyzing protocols that are of practical importance, leading
researchers often fail to treat th...
In EUROCRYPT 2013, Lu and Ostrovsky proposed the notion of Garbled RAM (GRAM) programs.
These GRAM programs are analogous to the classic result of Yao’s garbled circuits: a large encrypted
memory ca...
Structure-Preserving Signatures from Type II Pairings
Structure-preserving signatures Type II pairings strong existential unforgeability
2016/1/23
We investigate structure-preserving signatures in asymmetric bilinear groups with an efficiently computable homomorphism from one source group to the other, i.e., the Type II setting. It has been sho...
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Structure-Preserving Signatures Generic Group Model Bilinear Groups
2016/1/5
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the
number of group elements needed in the verification key and the signature, and the number of pairing...
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
block ciphers Feistel like ciphers impossible differential
2016/1/4
While recent publications have shown strong relations between
impossible differential and zero-correlation distinguishers as well as
between zero-correlation and integral distinguishers, we analyze ...
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
public-key cryptography
2014/3/6
We propose a general framework to develop fully homomorphic encryption schemes (FHE) without using Gentry's technique. Initially, a private-key cryptosystem is built over $\mathbb{Z}_n$ ($n$ being an ...
Another Look at Automated Theorem-Proving. II
public-key cryptography / public-key cryptography automated proofs proof checking, encryption
2012/3/26
I continue the discussion initiated in part I of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers ...
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Vulnerability FPGA Xilinx Virtex-II FPGAs
2011/7/25
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems.
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
implementation / Side-Channel Analysis
2012/3/27
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to pro...
Proving Coercion-Resistance of Scantegrity II
E-Voting Coercion-Resistance Protocol Analysis
2010/10/11
In this paper, we prove that Scantegrity II enjoys an optimal level of coercion-resistance, i.e., the same level of coercion-resistance as an ideal voting protocol (which merely reveals the outcome of...