搜索结果: 1-7 共查到“军事学 Shuffling”相关记录7条 . 查询时间(0.328 秒)
Distributed Differential Privacy via Shuffling
differential privacy MPC
font style='font-size:12px;'>
2019/3/2
We consider the problem of designing scalable, robust protocols for computing statistics about sensitive data. Specifically, we look at how best to design differentially private protocols in a distrib...
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
oblivious shuffling data outsourcing cloud computing
font style='font-size:12px;'>
2019/1/26
As data outsourcing becomes popular, oblivious algorithms have raised extensive attentions since their control flow and data access pattern appear to be independent of the input data they compute on a...
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
masking shuffling RNG
font style='font-size:12px;'>
2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Lattice-Based Cryptography BLISS Side-Channel Analysis
font style='font-size:12px;'>
2017/2/20
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, sh...
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
PRFs Shuffling
font style='font-size:12px;'>
2016/1/9
Combining countermeasures is usually assumed to be the
best way to protect embedded devices against side-channel attacks. These
combinations are at least expected to increase the number of measureme...
Secure Multi-Party Shuffling
cryptographic protocols Multi-Party Computation
font style='font-size:12px;'>
2015/12/29
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a pri...
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers– Extended Version –
Higher-order Masking Software Implementations Block Ciphers
font style='font-size:12px;'>
2009/9/2
Differential Power Analysis (DPA) is a powerful side channel
key recovery attack that efficiently breaks block ciphers implementations.
In software, two main techniques are usually applied to thwart...