搜索结果: 1-6 共查到“军事学 UNIVARIATE”相关记录6条 . 查询时间(0.015 秒)
MiMC and GMiMC are families of MPC-friendly block ciphers and hash functions. In this note, we show that the block ciphers MiMC-2n/n2n/n (or Feistel-MiMC) and univariate GMiMC are vulnerable to an att...
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Coppersmith's method lattices polynomial congruences
2016/12/9
We draw a new connection between Coppersmith's method for finding small solutions to polynomial congruences modulo integers and the capacity theory of adelic subsets of algebraic curves. Coppersmith's...
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Coppersmith's Algorithm Small Roots of Polynomial Equations LLL
2016/1/9
In a seminal work at EUROCRYPT '96, Coppersmith showed how to find all small roots of a univariate polynomial congruence in polynomial time: this has found many applications in public-key cryptanalysi...
Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Coppersmith's Algorithm Small Roots of Polynomial Equations
2014/3/10
In a seminal work at EUROCRYPT '96, Coppersmith showed how to find all small roots of a univariate polynomial congruence in polynomial time: this has found many applications in public-key cryptanalysi...
Univariate Side Channel Attacks and Leakage Modeling
applications Side Channel Attack Correlation Regression
2011/7/25
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades numerous vari...
Univariate Side Channel Attacks and Leakage Modeling
applications / Side Channel Attack Correlation Regression
2012/3/28
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades numerous vari...