搜索结果: 1-15 共查到“军事学 Variants”相关记录44条 . 查询时间(0.062 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
font style='font-size:12px;'>
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
Variants of the AES Key Schedule for Better Truncated Differential Bounds
AES Key schedule Related-key Truncated Differential
font style='font-size:12px;'>
2019/2/27
Differential attacks are one of the main ways to attack block ciphers. Hence, we need to evaluate the security of a given block cipher against these attacks. One way to do so is to determine the minim...
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model
GGM AGM
font style='font-size:12px;'>
2019/1/2
Fuchsbauer, Kiltz, and Loss~(Crypto'18) gave a simple and clean definition of an ¥emph{algebraic group model~(AGM)} that lies in between the standard model and the generic group model~(GGM). Specifica...
A Comparison of NTRU Variants
Post-quantum crypto NTRU
font style='font-size:12px;'>
2018/12/3
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on NTRU.
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
public-key cryptography Different Signature Variants
font style='font-size:12px;'>
2018/8/28
The Fiat-Shamir paradigm encompasses many different ways of turning a given identification scheme into a signature scheme. Security proofs pertain sometimes to one variant, sometimes to another. We sy...
Data Oblivious Genome Variants Search on Intel SGX
SGX TEE
font style='font-size:12px;'>
2018/8/10
We show how to build a practical, private data oblivious genome variants search using Intel SGX. More precisely, we consider the problem posed in Track 2 of the iDash Privacy and Security Workshop 201...
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Lattice-Based Cryptography Homomorphic Encryption Scale-Invariant Scheme
font style='font-size:12px;'>
2018/6/13
Homomorphic encryption provides the ability to compute on encrypted data without ever decrypting them. Potential applications include aggregating sensitive encrypted data on a cloud environment and co...
Secure top most significant genome variants search: iDASH 2017 competition
genome variants search private genomic data IDASH competition
font style='font-size:12px;'>
2018/4/4
One of the 3 tracks of iDASH Privacy & Security Workshop 2017 competition was to execute a whole genome variants search on private genomic data. Particularly, the search application was to find the to...
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
signature schemes DSA ECDSA
font style='font-size:12px;'>
2017/9/18
The American signature standards DSA and ECDSA, as well as their Russian and Chinese counterparts GOST 34.10 and SM2, are of utmost importance in the current security landscape. The mentioned schemes ...
On the Statistical Leak of the GGH13 Multilinear Map and some Variants
Cryptanalysis Multilinear Maps Statistical Leaks
font style='font-size:12px;'>
2017/5/31
At EUROCRYPT 2013, Garg, Gentry and Halevi proposed a candidate construction of cryptographic multilinear map (MMap). Despite weaknesses uncovered by Hu and Jia (EUROCRYPT 2016), this candidate is sti...
Private Projections & Variants
cryptographic protocols linear complexity
font style='font-size:12px;'>
2016/12/15
There are many realistic settings where two mutually suspicious parties need to share some specific information while keeping everything else private. Various privacy-preserving techniques (such as Pr...
Stronger Security Variants of GCM-SIV
GCM-SIV nonce-reuse misuse-resistance authenticated encryption provable security
font style='font-size:12px;'>
2016/12/10
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated. While this is an advantage over the original GCM,...
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
SIMON Lightweight block cipher Integral attack
font style='font-size:12px;'>
2016/6/20
SIMON is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design ratio...
Two More Efficient Variants of the J-PAKE Protocol
Password-authenticated key exchange J-PAKE Efficiency
font style='font-size:12px;'>
2016/4/15
Recently, the password-authenticated key exchange protocol J-PAKE of Hao and Ryan (Workshop on Security Protocols 2008) was formally proven secure in the algebraic adversary model by Abdalla et al.(IE...
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
Block cipher Statistical integral Integral attack
font style='font-size:12px;'>
2016/2/24
Integral attacks form a powerful class of cryptanalytic techniques
that have been widely used in the security analysis of block ciphers.
The integral distinguishers are based on balanced properties ...