搜索结果: 1-7 共查到“军事学 corruption”相关记录7条 . 查询时间(0.017 秒)
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Fault attack laser injection flash memory
2018/11/2
Physical attacks are a known threat to secure embedded systems. Notable among these is laser fault injection, which is probably the most powerful fault injection technique. Indeed, powerful injection ...
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
two-party computation simultaneous corruption universal composability with local adversaries
2016/1/6
We consider secure two-party computation in the client-server model. In our scenario, two adversaries
operate separately but simultaneously, each of them corrupting one of the parties and a
restrict...
Efficient detection of integrity violations is crucial for the reliability of both data at rest and data in transit. While ideally one would want to always find all changes in the input data, in pract...
Towards Strong Adaptive Corruption Security of Authenticated Key Exchange
Security model Authenticated Key Exchange SessionState Ephemeral Key Key Compromise Impersonation Unknown Key Share Matching Sessions
2011/2/23
In this paper we study strong adaptive corruption security definitions for authenticated key exchange (AKE) protocols. Many recent protocols for Authenticated Key Exchange have been proven correct in ...
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Department of Computer Science, Jinan University School of Information Systems, Singapore Management University
2010/7/13
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss in Eurocrypt'98, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same me...
From Dolev-Yao to Strong Adaptive Corruption:Analyzing Security in the Presence of Compromising Adversaries
Dolev-Yao Strong Adaptive Corruption hierarchy of adversary models
2009/6/11
We formalize a hierarchy of adversary models for security
protocol analysis, ranging from a Dolev-Yao style adversary
to more powerful adversaries who can reveal different parts
of principals’ stat...
MPC vs. SFE: Perfect Security in a Unified Corruption Model
MPC SFE Unified Corruption Model
2008/9/11
Secure function evaluation (SFE) allows a set of players to compute an arbitrary agreed function of their private inputs, even if an adversary may corrupt some of the players. Secure multi-party compu...