搜索结果: 1-15 共查到“Certification”相关记录48条 . 查询时间(0.13 秒)
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
side-channel analysis security evaluations mutual information
font style='font-size:12px;'>
2019/2/27
Leakage certification aims at guaranteeing that the statistical models used in side-channel security evaluations are close to the true statistical distribution of the leakages, hence can be used to ap...
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Vehicular communications (V2X) implicit certificates butterfly key expansion
font style='font-size:12px;'>
2019/2/25
In the implicit certification model, the process of verifying the validity of the signer's public key is combined with the verification of the signature itself. When compared to traditional, explicit ...
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
quantum cryptography Mixed Quantum States
font style='font-size:12px;'>
2018/11/8
We investigate sampling procedures that certify that an arbitrary quantum state on nn subsystems is close to an ideal mixed state φ⊗nφ⊗n for a given reference state φφ, up to errors on a f...
Information Entropy Based Leakage Certification
information theory maximum entropy maximum entropy distribution
font style='font-size:12px;'>
2018/11/6
Side-channel attacks and evaluations typically utilize leakage models to extract sensitive information from measurements of cryptographic implementations. Efforts to establish a true leakage model is ...
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
RSA parameter validation zero-knowledge proofs
font style='font-size:12px;'>
2018/1/12
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to convince a verifier that a set of RSA parameters is well-structured (e.g., that the modulus is the prod...
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
secure multiparty computation garbled circuit input correctness
font style='font-size:12px;'>
2017/6/15
Secure multi-party computation allows a number of participants to securely evaluate a function on their private inputs and has a growing number of applications. Two standard adversarial models that tr...
Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)
Cryptanalysis Attribute-Based Signatures Anonymous Credentials
font style='font-size:12px;'>
2016/12/8
Anonymous credential systems enable users to authenticate themselves in a privacy-preserving manner. At
the conference ESORICS 2016, Kaaniche and Laurent presented an anonymous certification scheme b...
A FRAMEWORK FOR AN OPEN SOURCE GEOSPATIAL CERTIFICATION MODEL
Geospatial certification Open Source Geospatial Technology Competency Model OSGeo
font style='font-size:12px;'>
2016/11/15
The geospatial industry is forecasted to have an enormous growth in the forthcoming years and an extended need for well-educated workforce. Hence ongoing education and training play an important role ...
NATIONAL GUIDELINES FOR DIGITAL CAMERA SYSTEMS CERTIFICATION
Mapping standards camera calibration accuracy guidelines digital photogrammetric sensor photogrammetric test field radiometry spatial resolution
font style='font-size:12px;'>
2016/7/4
Digital camera systems are a key component in the production of reliable, geometrically accurate, high-resolution geospatial products. These systems have replaced film imaging in photogrammetric data ...
Attack Resistant Trust Metrics for Public Key Certification
Attack Resistant Trust Metrics Public Key Certification
font style='font-size:12px;'>
2016/5/24
This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the effectiveness of trust metrics in resisting att...
Certification and Efficient Proofs of Committed Topology Graphs
data aggregation privacy time-series data
font style='font-size:12px;'>
2016/1/23
Abstract. With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solut...
Entanglement-free Certification of Entangling Gates
Entanglement-free Certification Entangling Gates
font style='font-size:12px;'>
2016/1/22
Not all quantum protocols require entanglement to outperform their classical alternatives. The nonclassical correlations that lead to a quantum advantage are conjectured to be captured by quantum disc...
Towards Easy Leakage Certification
implementation leakage modeling
font style='font-size:12px;'>
2015/12/30
Side-channel attacks generally rely on the availability of good
leakage models to extract sensitive information from cryptographic implementations.
The recently introduced leakage certification test...
The EuroSDR Approach on Digital Airborne Camera Calibration and Certification
Digital Camera Calibration Validation Certification Standardization
font style='font-size:12px;'>
2015/12/18
The comprehensive analysis of new digital airborne photogrammetric camera systems is an important topic right now. Faster than originally expected the new digital sensors phased into market and are al...
That’s News to Me! Information Revelation in Professional Certification Markets
Professional Certification Markets Information Revelation
font style='font-size:12px;'>
2015/9/21
Using sportscard grading as an example, we employ field experiments to investigate
empirically the informational role of professional certifiers. In the past 20 years, professional
grading of spor...