搜索结果: 1-7 共查到“军事学 Key Leakage”相关记录7条 . 查询时间(0.078 秒)
A Key Leakage Preventive White-box Cryptographic Implementation
white-box cryptography gray-box attacks
font style='font-size:12px;'>
2018/11/2
A white-box cryptographic implementation is to defend against white-box attacks that allow access and modification of memory or internal resources in the computing device. In particular, linear and no...
Weak-Key Leakage Resilient Cryptography
weak key-leakage attacks public-key encryption scheme chosen-ciphertext security
font style='font-size:12px;'>
2016/1/25
In traditional cryptography, the standard way of examining the security of a scheme is to
analyze it in a black-box manner, capturing no side channel attacks which exploit various forms
of unintende...
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
applications Bitcoin
font style='font-size:12px;'>
2016/1/5
A Bitcoin wallet is a set of private keys known to a user and
which allow that user to spend any Bitcoin associated with those keys. In
a hierarchical deterministic (HD) wallet, child private keys a...
Certificate-Based Encryption Resilient to Key Leakage
certificate-based encryption master secret key leakage dual system encryption
font style='font-size:12px;'>
2015/12/31
Certificate-based encryption (CBE) is an important class of public key encryption but the
existing schemes are secure only under the premise that the decryption key (or private key) and master
priva...
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
DSA exponentiation fault injection public modulus lattice reduction
font style='font-size:12px;'>
2010/11/22
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do not seem critical must ...
Public-Key Cryptosystems Resilient to Key Leakage
Public-Key Cryptosystems Key Leakage
font style='font-size:12px;'>
2009/6/12
Most of the work in the analysis of cryptographic schemes is concentrated in abstract ad-
versarial models that do not capture side-channel attacks. Such attacks exploit various forms
of unintended ...
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Bias Cryptanalysis Keystream Key Leakage RC4 Stream Cipher
font style='font-size:12px;'>
2008/8/18
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key
Scheduling Algorithm (KSA) of RC4, the initial bytes of the permutation, i.e., S[y]
for small values of y are biased to...