搜索结果: 1-15 共查到“军事学 techniques”相关记录55条 . 查询时间(0.13 秒)
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
AES SBox circuit area circuit depth
2019/7/15
In this paper we consider various methods and techniques to find the smallest circuit realizing a given linear transformation on nn input signals and mm output signals, with a constraint of a maximum ...
Scalable Private Set Union from Symmetric-Key Techniques
Private Set Union Private Membership Test
2019/7/4
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Lattices Zero-Knowledge Proofs Commitments
2019/6/4
A key component of many lattice-based protocols is a zero-knowledge proof of knowledge of a vector s⃗ s→ with small coefficients satisfying As⃗ =u⃗ modqAs→=u→modq. While there exist ...
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
lattice-based cryptography zero-knowledge proof CRT packing, ring signature
2019/5/9
We devise new techniques for design and analysis of efficient lattice-based zero-knowledge proofs (ZKP). First, we introduce one-shot proof techniques for non-linear polynomial relations of degree k≥2...
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Cost effective techniques for chip delayering and in-situ depackaging
package removal delayering decapsulation
2019/3/20
Invasive or semi-invasive attacks require, of course, because of their nature, the removal of metal layers or at least the package de-capsulation of the chip. For many people - not expert in those sam...
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
security evaluation Renyi divergence square-friendly
2019/1/26
Dodis and Yu (TCC 2013) studied how the security of cryptographic primitives that are secure in the "ideal" model in which the distribution of a randomness is the uniform distribution, is degraded whe...
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
accumulators zero knowledge commitments
2018/12/11
We present batching techniques for cryptographic accumulators and vector commitments in groups of unknown order. Our techniques are tailored for decentralized settings where no trusted accumulator man...
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
cryptographic protocols consensus techniques
2018/11/16
The increasing number of cryptocurrencies, as well as the rising number of actors within each single cryptocurrency, inevitably leads to tensions between the respective communities. As with open sourc...
New Techniques for Efficient Trapdoor Functions and Applications
Trapdoor functions Lossy trapdoor functions Computational Diffie-Hellman assumption
2018/11/13
Prior to our work, all constructions of deterministic encryption based even on the stronger DDH assumption incurred a quadratic gap between the ciphertext and plaintext sizes. Moreover, all DDH-based ...
New Techniques for Obfuscating Conjunctions
obfuscation conjunctions learning parity with noise
2018/11/7
We abstract the Bishop et al. scheme to obtain an equivalent yet more efficient "dual'' scheme that can handle conjunctions over exponential size alphabets. This scheme admits a straightforward proof ...
复旦大学计算机科学与技术学院信息安全课件 Classical Encryption Techniques (cont.)
复旦大学计算机科学与技术学院 信息安全 课件 Classical Encryption Techniques (cont.)
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 Classical Encryption Techniques (cont.)。
New techniques for multi-value homomorphic evaluation and applications
lwe-based FHE multi-value bootstrapping homomorphic LUT
2018/6/25
In this paper, we propose a new technique to perform several homomorphic operations in one bootstrapping call over a multi-value plaintext space. Our construction relies on the FHEW-based gate bootstr...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...