搜索结果: 1-15 共查到“军事学 Open”相关记录17条 . 查询时间(0.234 秒)
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
font style='font-size:12px;'>
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
font style='font-size:12px;'>
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
Side-Channel assessment of Open Source Hardware Wallets
PIN ECDSA
font style='font-size:12px;'>
2019/4/23
Side-channel attacks rely on the fact that the physical behavior of a device depends on the data it manipulates. We show in this paper how to use this class of attacks to break the security of some cr...
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
cryptographic protocols non-recyclable resources
font style='font-size:12px;'>
2017/7/6
Bitcoin has proven to be very successful. The Bitcoin blockchain is backed up by a large-scale network of miners via proof-of-work mechanism. Unfortunately, these miners consume huge amount of non-rec...
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
post-quantum cryptography key exchange implementation
font style='font-size:12px;'>
2016/12/8
Designing public key cryptosystems that resist attacks by quantum computers is an important area of current cryptographic research and standardization. To retain confidentiality of today's communicati...
Extracting the RC4 secret key of the Open Smart Grid Protocol
Cryptography Security RC4 Smart Grid
font style='font-size:12px;'>
2016/5/17
The Open Smart Grid Protocol (OSGP) is a widely used industry standard for exchanging sensitive data between devices inside of smart grids. For message confidentiality, OSGP implements a customised fo...
Open Sesame: The Password Hashing Competition and Argon2
Password Hashing Competition Argon2 Memory-Hard Hash Functions
font style='font-size:12px;'>
2016/2/23
In this document we present an overview of the background to and
goals of the Password Hashing Competition (PHC) as well as the design of its
winner, Argon2, and its security requirements and proper...
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
side-channel analysis acquisition synchronization
font style='font-size:12px;'>
2016/1/25
This paper introduces a complete side channel analysis toolbox, inclusive of the analog capture hardware, target device, capture software, and analysis software. The highly modular design allows use o...
Structural Weaknesses in the Open Smart Grid Protocol
protocol analysis authentication protocol OSGP
font style='font-size:12px;'>
2016/1/4
The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in
large-scale Smart Metering projects. The protocol was developed by the OSGP Alliance
and published as a standard by ...
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
cryptanalysis smart grid authenticated encryption
font style='font-size:12px;'>
2015/12/30
This paper analyses the cryptography used in the Open
Smart Grid Protocol (OSGP). The authenticated encryption (AE) scheme
deployed by OSGP is a non-standard composition of RC4 and a homebrewed
MAC...
Proving TLS-attack related open biases of RC4
Keylength dependent Anomaly
font style='font-size:12px;'>
2014/3/10
After a series of works on RC4 cryptanalysis in last few years (published in flagship cryptology conferences and journals), the most significant (and also very recent) attack on the cipher has been th...
An Efficient Protocol for the Commit-Prove-Fair-Open functionality
cryptographic protocols / commit-prove-fair-open functionality resource fairness time-lines secure multi-party computation
font style='font-size:12px;'>
2012/3/21
In TCC 2006, Garay et al. introduced the notion of "commit-prove-fair-open" functionality in order to achieve what they called "resource fairness" of secure multi-party computation(MPC) with corrupted...
An Efficient Protocol for the Commit-Prove-Fair-Open functionality
cryptographic protocols / commit-prove-fair-open functionality resource fairness ime-lines secure multi-party computation
font style='font-size:12px;'>
2012/3/23
In TCC 2006, Garay et al. introduced the notion of "commit-prove-fair-open" functionality in order to achieve what they called "resource fairness" of secure multi-party computation(MPC) with corrupted...
OPEN SOURCE IS NOT ENOUGH ATTACKING THE EC-PACKAGE OF BOUNCYCASTLE VERSION 1.x 132
ECC BouncyCastle
font style='font-size:12px;'>
2009/6/3
BouncyCastle is an open source Crypto provider written in Java which supplies
classes for Elliptic Curve Cryptography (ECC). We have found a flaw in the class ECPoint
resulting from an unhappy inter...
Group Signature where Group Manager,Members and Open Authority are Identity-Based
Group Signature Group Manager Open Authority
font style='font-size:12px;'>
2009/2/13
We present the first group signature scheme with provable
security and signature size O() bits where the group manager, the group
members, and the Open Authority (OA) are all identity-based. We use...