搜索结果: 1-15 共查到“军事学 human”相关记录26条 . 查询时间(0.244 秒)
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Enigma Machine authenticated encryption polyalphabetic cipher
2019/5/21
Enigma 2000 (E2K) is a cipher that updates the World War II-era Enigma Machine for the twenty-first century. Like the original Enigma, E2K is intended to be computed by an offline device; this prevent...
Defending Democracy and Human Rights in the Western Hemisphere
Defending Democracy Human Rights e Western Hemisphere
2019/10/10
One glimpse at the covers of the main news and political magazines in recent years is often enough to discern a common theme. These publications often display fatalist titles such as “Democracy in Dem...
Wildlife and Drug Trafficking, Terrorism, and Human Security
Wildlife Drug Trafficking Terrorism Human Security
2019/10/11
The planet is experiencing alarming levels of species loss caused in large part by intensified poaching stimulated by a greatly expanding demand for animals, plants, and wildlife products. The rate of...
Cryptography is a key element in establishing trust and enabling services in the digital world. Currently, cryptography is realized with mathematical operations and represented in ways that are not ac...
Blockchain technology like Bitcoin is a rapidly growing field of research which has found a wide array of applications. However, the power consumption of the mining process in the Bitcoin blockchain a...
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
electrtonic voting human factors in security verifiability
2018/7/18
A well-known issue in electronic voting is the risk of manipulation of the cast vote. For countering this risk, a number of methods have been proposed that enable the voter to verify that their cast v...
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Human computation Key exchange One-time passwords
2017/6/9
We propose the first user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. If a user happens to log in to a server from a terminal that has been fully...
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
low-tech ciphers authenticated encryption
2017/4/24
ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed to be hard to break. LC4 is intended for encrypted communication between humans o...
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional...
Zero-knowledge proofs have driven the field of cryptography since their conception over thirty
years ago. It is well established that two-message zero-knowledge protocols for NP do not exist,
and th...
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Virginia Commonwealth University
2016/2/23
We introduce the novel notion of a Proof of Human-work (PoH) and present the first distributed
consensus protocol from hard Artificial Intelligence problems. As the name suggests, a PoH is a proof
t...
Human-readable Proof of the Related-Key Security of AES-128
AES related-key differential attack security proof
2016/1/27
The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced efficient compute...
Random number generators have direct applications in information security, online
gaming, gambling, and computer science in general. True random number generators
need an entropy source which is a p...
Algebraic Attacks on Human Identification Protocols
Human identification protocols linear system of congruences learning with errors
2016/1/7
Human identification protocols are challenge-response protocols that rely on human computational
ability to reply to random challenges from the server based on a public function of a shared
secret a...
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Human Identification Protocols Observer Attack Entity Authentication
2010/9/14
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the...