搜索结果: 1-15 共查到“知识库 军事学 Enhanced”相关记录43条 . 查询时间(0.14 秒)
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
secret-key cryptography PUF
font style='font-size:12px;'>
2018/11/14
This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all P...
Enhanced Security of Attribute-Based Signatures
ABS universal composability
font style='font-size:12px;'>
2018/11/13
Despite the recent advances in attribute-based signatures (ABS), no schemes have yet been considered under a strong privacy definition. We enhance the security of ABS by presenting a strengthened simu...
Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations
Black-box separations Enhanced Trapdoor Permutations Trapdoor Permutations
font style='font-size:12px;'>
2018/11/9
Trapdoor permutations (TDP) are a fundamental primitive in cryptography. Over the years, several variants of this notion have emerged as a result of various applications. However, it is not clear whet...
A Cyber Federal Deposit Insurance Corporation: Achieving Enhanced National Security
Insurance Corporation National Security Shared Risk Shared Defense
font style='font-size:12px;'>
2019/10/22
Of the emerging man-made risks affecting U.S. national security, cyber threats have enjoyed the most attention and resources from national security leaders and policymakers. And yet, cyber threats rem...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
font style='font-size:12px;'>
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Fault attack SIMD Vectorization
font style='font-size:12px;'>
2017/11/13
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and elegant compilation approach to mitigate the impact of faults to cryptograp...
Enhanced Modelling of Authenticated Key Exchange Security
BUKS UUKS
font style='font-size:12px;'>
2017/9/14
The security models for Authenticated Key Exchange do not consider leakages on pre–computed ephemeral data before their use in sessions. We investigate the consequences of such leakages and point out ...
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
anonymous broadcast encryption outsider anonymity ternary subset difference
font style='font-size:12px;'>
2017/3/27
This paper puts forward an efficient broadcast encryption in public key setting employing ternary tree subset difference method for revocation. It provides outsider anonymity disabling the revoked use...
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security
Arbiter PUF (APUF) APUF compositions modeling attack
font style='font-size:12px;'>
2016/12/7
Arbiter Physically Unclonable Function (APUF), while being relatively lightweight, is extremely vulnerable to modeling
attacks. Hence, various compositions of APUFs such as XOR APUF and Lightweight S...
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
font style='font-size:12px;'>
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Ideal Lattices Gaussian Sampling Digital Signatures
font style='font-size:12px;'>
2016/1/23
The recent Bimodal Lattice Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. It offers small signatures of 5600 bits for a 128-bi...
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
privacy participatory sensing collusion resistance
font style='font-size:12px;'>
2016/1/9
Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users a...
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Social economic and policy issues of trust security and privacy
font style='font-size:12px;'>
2015/12/30
Establishing friendship relationships on Facebook often entails information
sharing which is based on the social trust and implicit contract
between users and their friends. In this context, Faceboo...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
font style='font-size:12px;'>
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
passwords PAKE authentication
font style='font-size:12px;'>
2015/12/21
We introduce a setting that we call Device-Enhanced PAKE (DE-PAKE), where PAKE (passwordauthenticated
key exchange) protocols are strengthened against online and offline attacks through the use
of a...