搜索结果: 1-15 共查到“Full”相关记录453条 . 查询时间(0.218 秒)
Accelerator Report: Full house in the LHC(图)
加速器 大型强子对撞机 Full house
font style='font-size:12px;'>
2023/5/29
Engineers invent vertical, full-color microscopic LEDs(图)
垂直全彩 微型LED 堆叠发光二极管 数字屏幕
font style='font-size:12px;'>
2023/6/6
Get a Great Full-Body Workout With Just a Single Dumbbell
Strength Training Training Dumbbell
font style='font-size:12px;'>
2024/12/20
If you want to stay in shape, you’ve got to adapt. That means figuring out how to get in an effective workout even if you lack access to a full gym. Whether you’re at home or on the road, knowing how ...
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
font style='font-size:12px;'>
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
puncturable encryption forward secrecy distributed setting
font style='font-size:12px;'>
2019/8/14
Managing sensitive data in highly-distributed environments is gaining a lot of attention recently. Often, once data is presented to such environments, this data is persistent there. Being able to "for...
Timed-Release Encryption With Master Time Bound Key (Full Version)
timed-release encryption Weil pairing bilinear Diffie-Hellman problem
font style='font-size:12px;'>
2019/8/8
Timed-release encryption allows senders to send a message to a receiver which cannot decrypt until a server releases a time bound key at the release time. The release time usually supposed to be known...
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
ZOCB ZOTR Authenticated encryption Associated data
font style='font-size:12px;'>
2019/6/3
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data, and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as the underlying primitive,...
Development of High-Performance Biodegradable Rigid Polyurethane Foams Using Full Modified Soy-Based Polyols
soy-polyol rigidpolyurethanefoam microflowsystem
font style='font-size:12px;'>
2024/3/12
Fossil fuel resources depletion and growing concern about environmental issues have raised the demand for newly sustainable biomaterials. To address this challenge, a new type of biodegradable and env...
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
hash function cryptanalysis chosen-prefix collision
font style='font-size:12px;'>
2019/5/13
A chosen-prefix collision attack is a stronger variant of a collision attack, where an arbitrary pair of challenge prefixes are turned into a collision. Chosen-prefix collisions are usually significan...
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
OTS Merkle Tree NTT SWIFFT
font style='font-size:12px;'>
2019/5/5
With the rapid development of quantum technologies, quantum-safe cryptography has found significant attention. Hash-based signature schemes have been in particular of interest because of (i) the impor...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
font style='font-size:12px;'>
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Quadratic Boolean function Disjoint quadratic form Correlation attack
font style='font-size:12px;'>
2019/3/1
We show that the correlation of any quadratic Boolean function can be read out from its so-called disjoint quadratic form. We further propose a polynomial-time algorithm that can transform an arbitrar...
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Vickrey Auction Trusted Execution Environment Intel SGX
font style='font-size:12px;'>
2019/2/27
The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bid...
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
FCA full collision group collision attack
font style='font-size:12px;'>
2019/1/9
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
linear cryptanalysis DES 3DES
font style='font-size:12px;'>
2019/1/2
In this paper we extend the work presented by Ashur and Posteuca in BalkanCryptSec 2018, by designing 0-correlation key-dependent linear trails covering more than one round of DES. First, we design a ...