搜索结果: 1-9 共查到“军事学 prediction”相关记录9条 . 查询时间(0.205 秒)
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Secure Computation Machine Learning 3PC
font style='font-size:12px;'>
2019/4/28
The concrete efficiency of secure computation has been the focus of many recent works. In this work, we present protocols for secure 33-party computation (3PC) tolerating one corruption in the offline...
The Secure Link Prediction Problem
Link prediction Homomorphic encryption Garbled circuit
font style='font-size:12px;'>
2019/1/29
Link Prediction is an important and well-studied problem for social networks. Given a snapshot of a graph, the link prediction problem predicts which new interactions between members are most likely t...
Key Prediction Security of Keyed Sponges
outer-keyed sponge full-keyed sponge key prediction
font style='font-size:12px;'>
2018/5/22
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation. If the key size kk is smaller than the...
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Random oracle model bounded retrieval model big-key cryptography
font style='font-size:12px;'>
2018/3/5
Towards advancing the use of BIG keys as a practical defense against key exfiltration, this paper provides efficiency improvements for cryptographic schemes in the bounded retrieval model (BRM). We id...
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Fault attacks branch misses performance counters
font style='font-size:12px;'>
2016/1/6
Performance monitors are provided in modern day computers for observing various features of the underlying microarchitectures. However the combination of underlying micro-architectural features and pe...
Countermeasures for the Simple Branch Prediction Analysis
Simple Branch Prediction key bits modern superscalar processors
font style='font-size:12px;'>
2009/1/9
Branch Prediction Analysis has been proposed as an attack method
to obtain key bits from a cryptographic application. In this report, we
put forth several solutions to avoid or prevent this attack. ...
On the Power of Simple Branch Prediction Analysis
Branch Prediction Analysis Countermeasures Modular Exponentiation
font style='font-size:12px;'>
2008/12/23
Very recently, a new software side-channel attack, called Branch Prediction Analysis
(BPA) attack, has been discovered and also demonstrated to be practically feasible on popular
commodity PC platfo...
Predicting Secret Keys via Branch Prediction
Branch Prediction Modular Exponentiation Montgomery Multiplication
font style='font-size:12px;'>
2008/12/15
This paper presents a new software side-channel attack enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty payed (extra
clock cycles) for a mispredict...
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Side channel attacks branch prediction attacks cache eviction attacks Binary Extended Euclidean Algorithm
font style='font-size:12px;'>
2008/9/17
Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leakage of “side-channel” informati...