搜索结果: 1-15 共查到“军事学 WEIGHT”相关记录26条 . 查询时间(0.167 秒)
Low Weight Discrete Logarithms and Subset Sum in 20.65n with Polynomial Memory
Low weight dlog subset sum representations Nested Rho
2019/8/19
We propose two polynomial memory collision finding algorithms for the low Hamming weight discrete logarithm problem in any abelian group GG. The first one is a direct adaptation of the Becker-Coron-Jo...
Ternary Syndrome Decoding with Large Weight
public-key cryptography code-based cryptography Information set decoding
2019/3/21
The Syndrome Decoding problem is at the core of many code-based cryptosystems. In this paper, we study ternary Syndrome Decoding in large weight. This problem has been introduced in the Wave signature...
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Correlation-immune Fourier-Hadamard transform Low Hamming weight
2018/1/27
The correlation immunity of Boolean functions is a property related to cryptography, to error correcting codes, to orthogonal arrays (in combinatorics, which was also a domain of interest of S. Golomb...
Compact Zero-Knowledge Proofs of Small Hamming Weight
zero-knowledge oblivious transfer ring signatures
2017/10/30
We introduce a new technique that allows to give a zero-knowledge proof that a committed vector has Hamming weight bounded by a given constant. The proof has unconditional soundness and is very compac...
Computing Low-Weight Discrete Logarithms
discrete logarithm problem number theory baby-step giant-step
2017/7/28
We propose some new baby-step giant-step algorithms for computing "low-weight" discrete logarithms; that is, for computing discrete logarithms in which the radix-b representation of the exponent is kn...
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
parity check linear cryptanalysis linear characteristics
2017/2/20
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate singular linear encodings of the output of the individual S-boxes. More specifically, w...
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators
TRNG FPGA Online Test
2016/4/18
We introduce the concept of canary numbers, to be used in
health tests for true random number generators. Health tests are essential
components of true random number generators because they are used...
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Experimental Results cryptographic protocols
2016/1/6
This paper describes techniques that enable vehicles to collect local information (such as road conditions
and traffic information) and report it via road-to-vehicle communications. To exclude malici...
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Side-channel analysis masking
2014/3/12
In hardware, substitution boxes for block ciphers can be saved already masked in the implementation. The masks must be chosen under two constraints: their number is determined by the implementation ar...
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Light-weight block cipher structural attack
2014/3/12
In [12], the authors present a new light-weight cryptographic primitive which supports an associated RFID-based authentication protocol. The primitive has some structural similarities to AES, but is p...
Analysis of the Hamming Weight of the Extended wmbNAF
public-key cryptography / elliptic curve cryptography multibase representation scalar multiplication
2012/3/23
Scalar multiplication is an important operation in elliptic curve cryptosystems(ECC). The algorithms for computing scalar multiplication are mostly based on the binary expansions of scalars, such as t...
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
secret-key cryptography / light-weight cipher cryptanalysis A2U2
2012/3/28
At IEEE RFID 2011, David et al. proposed a new cryptographic primitive for use with RFID [2]. The design is a stream cipher called A2U2. Shortly afterwards, an attack was published on IACR Eprint by C...
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
secret-key cryptography light-weight cipher cryptanalysis A2U2
2011/6/9
At IEEE RFID 2011, David et al. proposed a new cryptographic primitive for use with RFID [2]. The design is a stream cipher called A2U2. Shortly afterwards, an attack was published on IACR Eprint by C...
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Shabal low-weight pseudo collision attack preimage attack guess-and-determine technique SHA-3 competition
2010/8/17
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weight pseudo collision attack on Shabal. Since a pseudo collision attack is trivial for Shabal, we focus...
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Elliptic Curve Cryptography Minimal Weight Conversion Average Joint Hamming Weight Digit Set Expansion
2010/7/13
In this paper, we propose the minimal joint Hamming weight conversion for any binary expansions of $d$ integers. With redundant representations, we may represent a number by many expansions, and the m...