搜索结果: 1-15 共查到“Public key cryptography”相关记录29条 . 查询时间(0.078 秒)
Homomorphism learning problems and its applications to public-key cryptography
Learning With Errors isogenies non-commutative cryptography
font style='font-size:12px;'>
2019/6/19
We present a framework for the study of a learning problem over abstract groups, and introduce a new technique which allows for public-key encryption using generic groups. We proved, however, that in ...
Public-Key Cryptography in the Fine-Grained Setting
Fine-grained Public-Key One-Way-Function
font style='font-size:12px;'>
2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
cryptographic protocols cryptographic algorithms
font style='font-size:12px;'>
2018/11/19
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorith...
复旦大学计算机科学与技术学院信息安全课件 Public Key Cryptography
复旦大学计算机科学与技术学院 信息安全 课件 Public Key Cryptography
font style='font-size:12px;'>
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 Public Key Cryptography。
From Laconic Zero-Knowledge to Public-Key Cryptography
Public Key Cryptography zero knowledge
font style='font-size:12px;'>
2018/6/5
Since its inception, public-key encryption (PKE) has been one of the main cornerstones of cryptography. A central goal in cryptographic research is to understand the foundations of public-key encrypti...
New Approach to Practical Leakage-Resilient Public-Key Cryptography
leakage-resilient public-key encryption key exchange protocols
font style='font-size:12px;'>
2017/5/25
We present a new approach to construct several leakage-resilient cryptographic primitives, including public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key...
The Complexity of Public-Key Cryptography
Public key encryption assumptions post quantum cryptography
font style='font-size:12px;'>
2017/5/2
We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for public-key encryption schemes, and the types of evidence ...
商洛学院数学与计算机应用学院初等数论课件Chapter 3 Public-Key Cryptography
商洛学院数学与计算机应用学院 初等数论 课件 Chapter 3 Public-Key Cryptography
font style='font-size:12px;'>
2017/4/7
商洛学院数学与计算机应用学院初等数论课件Chapter 3 Public-Key Cryptography.
第四届ACM亚洲公钥密码学研讨会(The 4th ACM ASIA Public-Key Cryptography Workshop)(APKC 2017)
第四届 ACM亚洲公钥密码学 研讨会
font style='font-size:12px;'>
2017/3/31
Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solv...
2017年公钥加密研讨会(The Workshop on Public Key Cryptography (PKC))
2017年 公钥加密 研讨会
font style='font-size:12px;'>
2017/1/9
The Workshop on Public Key Cryptography (PKC) been sponsored by the IACR since 2003. PKC has been the main annual conference focusing on all aspects of public-key cryptography, attracting cutting-edge...
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
public-key encryption signatures related-key attacks
font style='font-size:12px;'>
2016/5/30
We revisit the question of constructing public-key encryption and signature schemes with
security in the presence of bounded leakage and tampering memory attacks. For signatures
we obtain the first ...
Using semidirect product of (semi)groups in public key cryptography
public-key cryptography key exchange protocol
font style='font-size:12px;'>
2016/4/15
In this survey, we describe a general key exchange protocol
based on semidirect product of (semi)groups (more specifically, on
extensions of (semi)groups by automorphisms), and then focus on practic...
Commutativity, Associativity, and Public Key Cryptography
Diffie-Hellman algorithms Tchebychev Polynomials New Public Key
font style='font-size:12px;'>
2016/2/24
In this paper, we will study some possible generalizations of
the famous Diffie-Hellman algorithm. As we will see, at the end, most of
these generalizations will not be secure or will be equivalent ...
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Coppersmith Methods Analytic Combinatorics Cryptanalysis
font style='font-size:12px;'>
2016/1/27
The Coppersmith methods is a family of lattice-based techniques to find small integer
roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent
development...
A SAT-based Public Key Cryptography Scheme
Public key cryptosystems Cryptographic protocols Data Encryption
font style='font-size:12px;'>
2015/12/24
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT
formula satisfied by the private key. Probabilistic encryption gene...