搜索结果: 1-12 共查到“军事学 Success”相关记录12条 . 查询时间(0.125 秒)
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
public-key cryptography lattice techniques
font style='font-size:12px;'>
2018/11/19
The lattice basis reduction algorithm is a method for solving the Shortest Vector Problem (SVP) on lattices. There are many variants of the lattice basis reduction algorithm such as LLL, BKZ, and RSR....
A remark on a success rate model fpr DPA and CPA
Side-channel attacks evaluation metric success rate
font style='font-size:12px;'>
2018/11/16
The success rate is the most common evaluation metric for measuring the performance of a particular side channel attack scenario. We improve on an analytic formula for the success rate.
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Linear cryptanalysis success probability non-monotonicity
font style='font-size:12px;'>
2018/5/28
Like any other cryptanalytic attack, the success rate of a linear attack is expected to improve as more data becomes available. Bogdanov and Tischhauser (FSE 2013) made the rather surprising claim tha...
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
multidimensional linear cryptanalysis multiple linear cryptanalysis chi-squared distribution
font style='font-size:12px;'>
2017/8/1
This work considers statistical analysis of attacks on block ciphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypothes...
Atomically Trading with Roger: Gambling on the success of a hardfork
migration inputs previous softforks
font style='font-size:12px;'>
2017/7/24
We present atomic trade protocols for Bitcoin and Ethereum that can bind two parties to swap coins in the event that two blockchains emerge from a single “pre-fork” blockchain. This work is motivated ...
Another Look at Success Probability in Linear Cryptanalysis
linear cryptanalysis success probability data complexity
font style='font-size:12px;'>
2017/5/8
This work studies the success probability of linear cryptanalysis. Complete expressions for the success probability are obtained using two different approaches, namely the order statistics and the hyp...
Post-quantum cryptography---dealing with the fallout of physics success
public-key cryptography post-quantum cryptography
font style='font-size:12px;'>
2017/4/17
Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively...
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate
NICV SNR Success Rate
font style='font-size:12px;'>
2016/12/24
Evaluation of side channel vulnerability of a cryptosystem has seen significant advancement in recent years. Researchers have proposed several metrics like Test Vector Leakage Assessment Methodology (...
A Key to Success -- Success Exponents for Side-Channel Distinguishers
Success ExponentsSide-Channel Distinguishers
font style='font-size:12px;'>
2016/12/8
The success rate is the classical metric for evaluating the performance of side-channel attacks. It is generally computed empirically from measurements for a particular device or using simulations. Cl...
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Side-channels success rate
font style='font-size:12px;'>
2016/1/7
The resistance of a cryptographic implementation with regards to side-channel analysis
is often quantified by measuring the success rate of a given attack. This approach cannot always be
followed in...
Success through confidence: Evaluating the effectiveness of a side-channel attack
Side-channel attacks divide-and-conquer strategy
font style='font-size:12px;'>
2015/12/31
Side-channel attacks usually apply a divide-and-conquer strategy,
separately recovering different parts of the secret. Their efficiency in
practice relies on the adversary ability to precisely asses...
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
DPA CPA success rate
font style='font-size:12px;'>
2014/3/5
Profiling power attacks like Template attack and Stochastic attack optimizes their performance by jointly evaluating the leakages of multiple sample points. However, such multivariate approaches are r...