军事学 >>> 军事学 >>> 军事理论 军事史 军事心理学 战略学 战役学 战术学 军队指挥学 军制学 军队政治工作学 军事后勤学 军事地学 军事技术 军事学其他学科 军事学其他学科
搜索结果: 1-11 共查到军事学 Parameter相关记录11条 . 查询时间(0.13 秒)
A Note on Parameter Choices of Round5     Public-Key Cryptography  Learning With Errors       font style='font-size:12px;'> 2019/8/22
We examine the current parameter choice of Round5, and rectify its consideration of the improved dual attack due to Albrecht [Albrecht-EC17]: there is one significant optimization of Albrecht's dual a...
We consider the problem of constructing Diffie-Hellman (DH) parameters which pass standard approaches to parameter validation but for which the Discrete Logarithm Problem (DLP) is relatively easy to s...
Parameter-Hiding Order Revealing Encryption     secret-key cryptography  Order Revealing Encryption       font style='font-size:12px;'> 2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
We initiate the study of public-key encryption (PKE) schemes and key-encapsulation mechanisms (KEMs) that retain security even when public parameters (primes, curves) they use may be untrusted and sub...
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE. A...
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion     Parameter Subversion  CRS       font style='font-size:12px;'> 2016/4/15
Motivated by the subversion of ``trusted'' public parameters in mass-surveillance activities, this paper studies the security of NIZKs in the presence of a maliciously chosen common reference string. ...
Attacks and parameter choices in HIMMO     Key predistribution scheme  collusion attack  identity  lattice analysis       font style='font-size:12px;'> 2016/2/23
The HIMMO scheme has been introduced as a lightweight collusion-resistant key pre-distribution scheme, with excellent efficiency in terms of bandwidth, energy consumption and computation time. As it...
We introduce the concept of Modi¯ed Parameter Attacks, a natural extension of the idea of Adapative Chosen Ciphertext Attacks (CCA2) under which some CCA2 secure systems can be shown to be ins...
Recently, Augot and Finiasz presented a coding theoretic public key cryptosystem that suggests a new approach for designing such systems based on the Polynomial Reconstruc- tion Problem. Their crypt...
The NTRUSign signature scheme was introduced in [8]. The original presentation gave a theoretical description of the scheme and an analysis of its security, along with several parameter choices which...
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3     Parameter Sets  NTRUEncrypt  NAEP  SVES-3       font style='font-size:12px;'> 2009/1/15
We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...