搜索结果: 1-5 共查到“密码学 Practical Security”相关记录5条 . 查询时间(0.171 秒)
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
anonymity digital signatures pseudonym
font style='font-size:12px;'>
2018/12/3
In this paper we present an extension of Pseudonymous Signature introduced by the German Federal BSI authority as a part of technical recommendations for electronic identity documents. Without switchi...
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Public Key Encryption Keyword Search
font style='font-size:12px;'>
2017/8/10
Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciphertexts using a receiver’s public key and upload them to a server. Upon receiving a keyword-search t...
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
AES side-channel attack localized EM measurements
font style='font-size:12px;'>
2017/3/27
In leakage-resilient symmetric cryptography, two important concepts have been proposed in order to decrease the success rate of differential side-channel attacks. The first one is to limit the attacke...
Elliptic and Hyperelliptic Curves: a Practical Security Analysis
public-key cryptography
font style='font-size:12px;'>
2014/3/7
Motivated by the advantages of using elliptic curves for discrete logarithm-based public-key cryptography, there is an active research area investigating the potential of using hyperelliptic curves of...
On the Practical Security of a Leakage Resilient Masking Scheme
Practical Security Masking Scheme
font style='font-size:12px;'>
2014/3/12
At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter constructio...