搜索结果: 1-15 共查到“军事学 Extractors”相关记录33条 . 查询时间(0.046 秒)
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Randomness Extractors Non-Malleability
font style='font-size:12px;'>
2019/3/4
In this paper, we consider the setting where a party uses correlated random tapes across multiple executions of a cryptographic algorithm. We ask if the security properties could still be preserved in...
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More
non-malleable codes non-malleable extractors explicit constructions
font style='font-size:12px;'>
2018/11/12
Non-malleable codes were introduced by Dziembowski, Pietrzak, and Wichs (JACM 2018) as a generalization of standard error correcting codes to handle severe forms of tampering on codewords. This notion...
When are Continuous-Source Fuzzy Extractors Possible?
fuzzy extractors secure sketches information-theory
font style='font-size:12px;'>
2018/5/22
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy source into the same uniformly distributed key. The ideal functionality of a fuzzy extractor outputs t...
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
non-malleable code privacy amplification non-malleable extractor
font style='font-size:12px;'>
2018/4/20
The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in several seemingly...
Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Tampering Extractors Adversarial Learning
font style='font-size:12px;'>
2017/9/28
Austrin, Chung, Mahmoody, Pass and Seth (Crypto'14) studied the notion of bitwise pp-tampering attacks over randomized algorithms in which an efficient `virus' gets to control each bit of the randomne...
Efficient, Reusable Fuzzy Extractors from LWE
fuzzy extractors biometrics
font style='font-size:12px;'>
2017/8/8
A fuzzy extractor (FE), proposed for deriving cryptographic keys from biometric data, enables reproducible generation of high-quality randomness from noisy inputs having sufficient min-entropy. FEs re...
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Fuzzy Extractor Physical Unclonable Functions Implementation Attacks
font style='font-size:12px;'>
2017/6/2
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. Originally, biometrics were the main motivation for fuzzy extractors but ...
Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
fuzzy extractors reusability adaptive fuzzy extractors
font style='font-size:12px;'>
2016/12/7
A Fuzzy Extractor (Dodis et al., Eurocrypt 2004) is a two-step protocol that turns a noisy secret into a uniformly distributed key R. To eliminate noise, the generation procedure takes as inputs an en...
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Non-Malleable Extractors Codes
font style='font-size:12px;'>
2016/4/7
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of ta...
Non-Malleable Extractors with Shorter Seeds and Their Applications
extractors non-malleable extractors seed length
font style='font-size:12px;'>
2016/1/25
Motivated by the problem of how to communicate over a public channel with an active adversary, Dodis and Wichs (STOC’09) introduced the notion of a non-malleable extractor. A non-malleable extractor n...
Two-sources Randomness Extractors for Elliptic Curves
Elliptic curves randomness extractor key derivation
font style='font-size:12px;'>
2016/1/25
This paper studies the task of two-sources randomness extractors for elliptic curves defined over finite fields K, where K can be a prime or a binary field. In fact, we introduce new constructions of ...
Reusable Fuzzy Extractors via Digital Lockers
Fuzzy extractors reusability key derivation
font style='font-size:12px;'>
2016/1/23
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollment phase that ...
On the Possibilities and Limitations of Computational Fuzzy Extractors
error-correcting code leakage-resilient cryptography key encapsulation mechanism
font style='font-size:12px;'>
2016/1/8
Fuller et al. (Asiacrypt 2013) studied on computational fuzzy extractors, and showed, as a
negative result, that the existence of a computational “secure sketch” implies the existence of an
informat...
Eliminating Leakage in Reverse Fuzzy Extractors
Physically Unclonable Functions Fuzzy Extractors Authentication
font style='font-size:12px;'>
2016/1/7
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems an...
Trapdoor Computational Fuzzy Extractors
Physical Unclonable Function PUF ring oscillator
font style='font-size:12px;'>
2016/1/5
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The computational security of our method can be clearly argued through hardness of Learning Parity With N...