搜索结果: 1-15 共查到“知识库 Z-order”相关记录1248条 . 查询时间(0.038 秒)
Extensive intraspecific gene order and gene structural variations in upland cotton cultivars
陆地棉 全基因组 比较分析遗传变异
font style='font-size:12px;'>
2024/4/16
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
byzantine cryptocurrency bitcoin
font style='font-size:12px;'>
2019/7/15
A framework for asynchronous, signature free, fully local and probabilistically converging total order algorithms is developed, that may survive in high entropy, unstructured Peer-to-Peer networks wit...
The Notion of Transparency Order, Revisited
Transparency order Differential power analysis S-box
font style='font-size:12px;'>
2019/6/12
We revisit the definition of Transparency Order (TO) and that of Modified Transparency Order (MTO) as well, which were proposed to measure the resistance of an S-box against Differential Power Analysi...
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
formal verification symbolic model tamarin prover
font style='font-size:12px;'>
2019/5/21
Diffie-Hellman groups are a widely used component in cryptographic protocols in which a shared secret is needed. These protocols are typically proven to be secure under the assumption they are impleme...
Second-order Scatter Attack
Side-channel Misalignment Scatter Second-order
font style='font-size:12px;'>
2019/4/3
Second-order analyses have shown a great interest to defeat first level of masking protections. Their practical realization remains tedious in a lot of cases. This is partly due to the difficulties of...
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
font style='font-size:12px;'>
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
font style='font-size:12px;'>
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
Higher-Order DCA against Standard Side-Channel Countermeasures
White-box DCA Higher-order DCA
font style='font-size:12px;'>
2018/11/13
At CHES 2016, Bos et al.et al. introduced differential computational analysisdifferential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack ...
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
side-channel analysis Threshold Implementation AES
font style='font-size:12px;'>
2018/11/12
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
font style='font-size:12px;'>
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols
ORE OPE searchable encryption
font style='font-size:12px;'>
2018/11/6
Database query evaluation over encrypted data has received a lot of attention recently. Order Preserving Encryption (OPE) and Order Revealing Encryption (ORE) are two important encryption schemes that...
Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields
finite fields inversion multiplication
font style='font-size:12px;'>
2018/11/5
Efficient scalar multiplication algorithms require a single finite field inversion at the end to convert from projective to affine coordinates. This inversion consumes a significant proportion of the ...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
font style='font-size:12px;'>
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Optimal Succinct Arguments via Hidden Order Groups
zero knowledge RSA
font style='font-size:12px;'>
2018/8/2
An argument of knowledge allows a prover to convince a verifier of the validity of certain statements. We construct succinct arguments of knowledge with an optimal communication complexity of O(λ) bit...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
font style='font-size:12px;'>
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...