搜索结果: 1-6 共查到“军事学 replacement”相关记录6条 . 查询时间(0.109 秒)
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
isogenies key agreement side-channel attack
font style='font-size:12px;'>
2019/6/21
We present a post-quantum key agreement scheme that does not require distinguishing between the initiator and the responder. This scheme is based on elliptic curve isogenies and can be viewed as a var...
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
PRNG CSPRNG Spritz
font style='font-size:12px;'>
2016/1/5
We found a statistical weakness in the Spritz algorithm designed by Ronald L. Rivest
and Jacob C. N. Schuldt. For N = 8: P rob(output(x) = output(x + 2)) = 1/N + 0.000498. The
bias becomes statistic...
Certificateless Group Oriented Signature Secure against Key Replacement Attack
Certificateless group signature
font style='font-size:12px;'>
2009/6/12
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificateless group oriented ...
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves
Time-Area Optimized Public-Key Engines MQ-Cryptosystems Elliptic Curves
font style='font-size:12px;'>
2009/6/5
In this paper ways to efficiently implement public-key schemes based onMultivariate Qua-
dratic polynomials (MQ-schemes for short) are investigated. In particular, they are claimed
to resist quantum...
Attacking a Public Key Cryptosystem Based on Tree Replacement
Cryptanalysis Public Key Cryptosystems Tree Replacement systems
font style='font-size:12px;'>
2009/3/25
We point out several security flaws in the cryptosystem based on tree
replacement systems proposed by Samuel, Thomas, Abisha and Subramanian
at INDOCRYPT 2002. Due to the success of (among others)
...
Key Replacement Attack on a Certificateless Signature Scheme
Certificateless signature key replacement attack bilinear pairing
font style='font-size:12px;'>
2009/1/6
Yap, Heng and Goi propose an efficient certificateless signature
scheme based on the intractability of the computational Diffie-
Hellman problem, and prove that the scheme is secure in the random or...