搜索结果: 1-11 共查到“军事学 patterns”相关记录11条 . 查询时间(0.173 秒)
Differentially Private Access Patterns in Secure Computation
secure computation differential privacy
2017/10/19
We explore a new security model for secure computation on large datasets. We assume that two servers have been employed to compute on private data that was collected from many users, and, in order to ...
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Finite automaton ARX cipher Modulo addition
2016/4/7
Inspired by Fu et al. work on modeling the exclusive-or differential property of the modulo addition as an mixed-integer programming problem, we propose a method with which any finite automaton can be...
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns
hash functions password hashing passwords
2016/1/27
We present the Balloon family of password
hashing functions. These are the first cryptographic
hash functions with proven space-hardness
properties that: (i) use a password-independent access
patt...
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Elliptic Curves Scalar Multiplication Straus-Shamir Trick
2015/12/31
This paper deals with the protection of elliptic curve scalar
multiplications against side-channel analysis by using the atomicity principle.
Unlike other atomic patterns, we investigate new formul?...
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Gr鴖tl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
hash function cryptanalysis preimage
2015/12/29
In this paper, we present improved preimage attacks on the reduced-round GOST hash
function family, which serves as the new Russian hash standard, with the aid of techniques such as the
rebound atta...
Secure Multiparty Computation with General Interaction Patterns
Secure multiparty computation Interactions Obfuscation
2015/12/18
We present a unified framework for studying secure multi-party computation (MPC) with
arbitrarily restricted interaction patterns. Our study generalizes both standard MPC and recent
models for MPC w...
We describe some observed trivially weak keys for the stream cipher RC4.
Keys with repeating patterns are found to be key length invariant. The cause of the problem is the simplistic key dependent st...
An Efficient Identification Scheme Based on Permuted Patterns
Efficient Identification Scheme Permuted Patterns
2009/4/17
An Efficient Identification Scheme Based on Permuted Patterns.
In this paper we describe a method of finding differential
patterns that may be used to attack reduced versions of SHA-1. We
show that the problem of finding optimal differential patterns for SHA-1
...
DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL EQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$
r-pattern exponential sum over Galois ring Kerdock-code binary sequence
2009/3/27
The distribution of r-patterns is an important aspect of pseudo-
randomness for periodic sequences over finite field.The aim of this work is
to study the distribution of r-patterns in the Kerdock-co...
Secure Hash Standard (SHS) [3] includes hashing algorithms
denoted SHA-n, n 2 224, 256, 384, 512 for producing message digests
of length n. These algorithms are based on a common design, sometimes
...