军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 public-key cryptography相关记录26条 . 查询时间(0.156 秒)
We present a framework for the study of a learning problem over abstract groups, and introduce a new technique which allows for public-key encryption using generic groups. We proved, however, that in ...
Public-Key Cryptography in the Fine-Grained Setting     Fine-grained  Public-Key  One-Way-Function       font style='font-size:12px;'> 2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorith...
复旦大学计算机科学与技术学院信息安全课件 Public Key Cryptography
From Laconic Zero-Knowledge to Public-Key Cryptography     Public Key Cryptography  zero knowledge       font style='font-size:12px;'> 2018/6/5
Since its inception, public-key encryption (PKE) has been one of the main cornerstones of cryptography. A central goal in cryptographic research is to understand the foundations of public-key encrypti...
We present a new approach to construct several leakage-resilient cryptographic primitives, including public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key...
The Complexity of Public-Key Cryptography     Public key encryption  assumptions  post quantum cryptography       font style='font-size:12px;'> 2017/5/2
We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for public-key encryption schemes, and the types of evidence ...
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first ...
In this survey, we describe a general key exchange protocol based on semidirect product of (semi)groups (more specifically, on extensions of (semi)groups by automorphisms), and then focus on practic...
In this paper, we will study some possible generalizations of the famous Diffie-Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or will be equivalent ...
The Coppersmith methods is a family of lattice-based techniques to find small integer roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent development...
A SAT-based Public Key Cryptography Scheme     Public key cryptosystems  Cryptographic protocols  Data Encryption       font style='font-size:12px;'> 2015/12/24
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption gene...
How to Keep a Secret: Leakage Deterring Public-key Cryptography     public-key cryptography       font style='font-size:12px;'> 2014/3/5
How is it possible to prevent the sharing of cryptographic functions? This question appears to be fundamentally hard to address since in this setting the owner of the key {\em is} the adversary: she w...
In this paper we propose an efficient multivariate public key cryp- tosystem based on permutation p-polynomials over finite fields. We first char- acterize a class of permutation p-polynomials over ...
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constrai...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...