搜索结果: 1-15 共查到“军队指挥学 entropy”相关记录38条 . 查询时间(0.093 秒)
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Bluetooth BLE
font style='font-size:12px;'>
2019/8/19
The specification of Bluetooth and Bluetooth Low Energy includes dedicated encryption key negotiation protocols used by two parties to agree on the entropy of encryption keys. In this work, we show th...
Complexity of Estimating Renyi Entropy of Markov Chains
information theory Renyi entropy Min-entropy
font style='font-size:12px;'>
2019/7/8
Estimating entropy of random processes is one of the fundamental problems of machine learning and property testing. It has numerous applications to anything from DNA testing and predictability of huma...
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
deterministic identity-based encryption adaptively secure auxiliary-input
font style='font-size:12px;'>
2019/1/26
There only exists one deterministic identity-based encryption (DIBE) scheme which is adaptively secure in the auxiliary-input setting, under the learning with errors (LWE) assumption. However, the mas...
Function Private Predicate Encryption for Low Min-Entropy Predicates
public-key cryptography ZIPE
font style='font-size:12px;'>
2019/1/4
In this work, we propose new predicate encryption schemes for zero inner-product encryption (ZIPE) and non-zero inner-product encryption (NIPE) predicates from prime-order bilinear pairings, which are...
Information Entropy Based Leakage Certification
information theory maximum entropy maximum entropy distribution
font style='font-size:12px;'>
2018/11/6
Side-channel attacks and evaluations typically utilize leakage models to extract sensitive information from measurements of cryptographic implementations. Efforts to establish a true leakage model is ...
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Predicate Encryption Public-Key Function Privacy
font style='font-size:12px;'>
2018/3/6
We present function private public-key predicate encryption schemes from standard cryptographic assumptions, that achieve new lower bounds on the min-entropy of underlying predicate distributions. Exi...
Unbounded ABE via Bilinear Entropy Expansion, Revisited
public-key cryptography attribute-based encryption
font style='font-size:12px;'>
2018/2/1
At the core of all of these constructions is a "bilinear entropy expansion" lemma that allows us to generate any polynomial amount of entropy starting from constant-size public parameters; the entropy...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
font style='font-size:12px;'>
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
On the impossibility of entropy reversal, and its application to zero-knowledge proofs
statistical zero-knowledge proof entropy reversal black-box reduction
font style='font-size:12px;'>
2017/9/25
Zero knowledge proof systems have been widely studied in cryptography. In the statistical setting, two classes of proof systems studied are Statistical Zero Knowledge (SZK) and Non-Interactive Statist...
Renyi Entropy Estimation Revisited
Renyi Entropy Estimation Renyi Entropy Sample Complexity
font style='font-size:12px;'>
2017/6/22
We revisit the problem of estimating entropy of discrete distributions from independent samples, studied recently by Acharya, Orlitsky, Suresh and Tyagi (SODA 2015), improving their upper and lower bo...
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Computational fuzzy extractor Learning with errors Authentication system
font style='font-size:12px;'>
2016/12/8
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure storage is expensive, the valuable entropy could originate fr...
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection
Entropy Estimators Collision Entropy Anomaly Detection
font style='font-size:12px;'>
2016/12/7
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection.
On the Entropy of Oscillator-Based True Random Number Generators
Oscillators true random number generators entropy estimation
font style='font-size:12px;'>
2016/12/7
True random number generators (TRNGs) are essential for cryptographic systems, and they are usually evaluated by the concept of entropy. In general, the entropy of a TRNG is estimated from its stochas...
Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure
online entropy estimators testable random number generators true random number generators in changing environments
font style='font-size:12px;'>
2016/12/7
Estimating entropy of randomness sources is a task of crit- ical importance in the context of true random number generators, as feeding cryptographic applications with insufficient entropy is a seriou...
Malleability of the blockchain’s entropy
Random number generation Blockchain Random Beacon
font style='font-size:12px;'>
2016/4/15
Trustworthy generation of public random numbers is necessary for the security of many cryptographic applications. It was suggested to use the inherent unpredictability of blockchains as a source of pu...