搜索结果: 1-5 共查到“密码学 Automated analysis”相关记录5条 . 查询时间(0.125 秒)
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
signature schemes symbolic models formal methods
font style='font-size:12px;'>
2019/7/10
The standard definition of security for digital signatures---existential unforgeability---does not ensure certain properties that protocol designers might expect. For example, in many modern signature...
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
whitebox cryptanalysis security evaluation
font style='font-size:12px;'>
2018/1/29
Differential computation analysis (DCA) is a technique recently introduced by Bos et al. and Sanfelix et al. for key recovery from whitebox implementations of symmetric ciphers. It consists in applyin...
Automated Analysis of Cryptographic Assumptions in Generic Group Models
generic group model multilinear maps graded encoding schemes
font style='font-size:12px;'>
2016/1/9
We initiate the study of principled, automated, methods for
analyzing hardness assumptions in generic group models, following the
approach of symbolic cryptography. We start by defining a broad clas...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
modes of operation synthesis
font style='font-size:12px;'>
2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks.
Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
Automated Analysis and Synthesis of Authenticated Encryption Schemes
secret-key cryptography authenticated encryption synthesis
font style='font-size:12px;'>
2015/12/29
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions
of confidentiality and integrity. Although various AE schemes are known, there remains significant
...