搜索结果: 1-9 共查到“军事学 cryptographic schemes”相关记录9条 . 查询时间(0.062 秒)
Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes
Lattice based cryptography Digital Signatures post quantum cryptography
font style='font-size:12px;'>
2018/3/5
This paper proposes a simple single bit flip fault attack applicable to several LWE (Learning With Errors Problem) based lattice based schemes like KYBER, NEWHOPE, DILITHIUM and FRODO which were submi...
Efficient Constructions for tt-(k,n)∗-Random Grid Visual Cryptographic Schemes
OR XOR
font style='font-size:12px;'>
2017/8/17
In this paper we consider both ``OR" and ``XOR" based monochrome random grid visual cryptographic schemes (RGVCS) for tt-(k,n)∗(k,n)∗ access structure which is a generalization of the thre...
The SM9 Cryptographic Schemes
cryptographic protocols identity-based cryptosystem
font style='font-size:12px;'>
2017/2/16
SM9 is a Chinese official cryptography standard which defines a set of identity-based cryptographic schemes from pairings. This report describes the technical specification of SM9 as a reference for t...
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
ASASA multivariate cryptography white-box cryptography
font style='font-size:12px;'>
2016/1/9
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the ASASA structure
ranging ...
Implementation Attacks on Post-Quantum Cryptographic Schemes
Implementation Attacks Post-Quantum Cryptographic Schemes
font style='font-size:12px;'>
2015/12/21
Post-quantum cryptographic schemes have been developed
in the last decade in response to the rise of quantum computers. Fortunately,
several schemes have been developed with quantum resistance.
How...
Cryptographic schemes, key exchange, public key.
general cryptography key exchange
font style='font-size:12px;'>
2014/3/13
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. ...
Remarks on Some Quantum Cryptographic Schemes
quantum key establishment quantum secret sharing BB84 scheme
font style='font-size:12px;'>
2009/11/18
We remark that the schemes [PhysRevLett.98.020503, PhysRevA.74.012315,
PhysRevA.71.022321, PhysRevA.72.012304, PhysRevA.69.052307, PhysRevA.59.1829]
are not secret sharing schemes as claimed.
Attacking Cryptographic Schemes Based on “Perturbation Polynomials”
Attacking Cryptographic Schemes Perturbation Polynomials sensor networks
font style='font-size:12px;'>
2009/6/12
We show attacks on several cryptographic schemes that have recently been proposed for
achieving various security goals in sensor networks. Roughly speaking, these schemes all use
“perturbation polyn...
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
Cryptographic Schemes Applications to Protocols
font style='font-size:12px;'>
2009/1/13
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, sign...