搜索结果: 1-15 共查到“军事学 the algorithm”相关记录214条 . 查询时间(0.187 秒)
An LLL Algorithm for Module Lattices
Module Lattices Euclidean lattice
font style='font-size:12px;'>
2019/9/17
The LLL algorithm takes as input a basis of a Euclidean lattice, and, within a polynomial number of operations, it outputs another basis of the same lattice but consisting of rather short vectors. We ...
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
foundations lattice techniques
font style='font-size:12px;'>
2019/9/16
Abstract. There is a large gap between theory and practice in the complexities of sieving algorithms for solving the shortest vector problem in an arbitrary Euclidean lattice. In this paper, we work t...
On the alpha value of polynomials in the tower number field sieve algorithm
number field sieve discrete logarithm pairing-friendly curve
font style='font-size:12px;'>
2019/8/2
In this paper, we provide a notable step towards filling the gap between theory (estimates of running-time) and practice (a discrete logarithm record computation) for the Tower Number Field Sieve (TNF...
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain
Blockchain bitcoin distributed ledger technology
font style='font-size:12px;'>
2019/7/17
Blockchains such as bitcoin rely on reaching global consensus for the distributed ledger, and suffer from a well know scalability problem. We propose an algorithm which can avoid double spending in th...
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
TES Simon's algorithm Quantum period finding algorithm
font style='font-size:12px;'>
2019/6/19
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm
Simon's algorithm classical queries symmetric cryptography
font style='font-size:12px;'>
2019/6/4
In symmetric cryptanalysis, the model of superposition queries has lead to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But t...
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Enigma Machine authenticated encryption polyalphabetic cipher
font style='font-size:12px;'>
2019/5/21
Enigma 2000 (E2K) is a cipher that updates the World War II-era Enigma Machine for the twenty-first century. Like the original Enigma, E2K is intended to be computed by an offline device; this prevent...
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
SM3 Side-channel Hash functions
font style='font-size:12px;'>
2019/4/3
SM3, the Chinese standard hash algorithm inspired from SHA2, can be attacker by similar means than SHA2 up to an adaptation to its differences. But this kind of attack is based on targeting point of i...
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points
CSIDH post-quantum cryptography Isogeny-based cryptography
font style='font-size:12px;'>
2019/4/3
At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptograp...
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Quantum Cryptanalysis Cyclotomic Ideal Lattices
font style='font-size:12px;'>
2019/3/4
The hardness of finding short vectors in ideals of cyclotomic number fields (hereafter, Ideal-SVP) can serve as a worst-case assumption for numerous efficient cryptosystems, via the average-case probl...
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
ring learning with errors learning with errors Ring-LWE
font style='font-size:12px;'>
2019/3/1
We provide several reductions of Ring-LWE problems to smaller Ring-LWE problems in the presence of samples of a restricted form (i.e. (a,b) such that a is restricted to a subring, or multiplicative co...
Solving binary MQ with Grover's algorithm
Grover's algorithm multivariate quadratics quantum resource estimates
font style='font-size:12px;'>
2019/2/25
The problem of solving a system of quadratic equations in multiple variables---known as multivariate-quadratic or MQ problem---is the underlying hard problem of various cryptosystems. For efficiency r...
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
stream cipher RC4 VMPC-R
font style='font-size:12px;'>
2019/1/18
We propose an authenticated encryption scheme for the VMPC-R stream cipher. VMPC-R is an RC4-like algorithm proposed in 2013. It was created in a challenge to find a bias-free cipher within the RC4 de...
Improved Quantum Multicollision-Finding Algorithm
post-quantum cryptography quantum algorithm multiclaw
font style='font-size:12px;'>
2018/11/21
The current paper improves the number of queries of the previous quantum multi-collision nding algorithms presented by Hosoyamada et al. at Asiacrypt 2017. Let ll-collision be ll distinct inputs that...
DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Blockchain Blocklattice Consensus
font style='font-size:12px;'>
2018/11/20
A blockchain system is a replicated state machine that must be fault tolerant. When designing a blockchain system, there is usually a trade-off between decentralization, scalability, and security. In ...