搜索结果: 1-13 共查到“知识库 军事学 3-D reconstruction”相关记录13条 . 查询时间(0.106 秒)
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
compressive sensing matching pursuit OMP
2018/12/3
An important prerequisite for Side-channel Attack (SCA) is leakage sampling where the side-channel measurements (e.g. power traces) of the cryptographic device are collected for further analysis. Howe...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
In [AJPS17], Aggarwal, Joux, Prakash & Santha described an elegant public-key cryptosystem (AJPS-1) mimicking NTRU over the integers. This algorithm relies on the properties of Mersenne primes instead...
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Encrypted database leakage
2017/7/24
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the clie...
Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
Approximate polynomial common divisor problem noisy multipolynomial reconstruction polynomial lattice
2017/4/17
In this paper, we investigate the hardness of the approximate polynomial common divisor problem, which is regarded as a polynomial analogy of the approximate integer common divisor problem. In order t...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multi-party computation (MPC) and, since recently, in the area of two-party cryptography as well. In a nutshell, this...
RSA private key reconstruction from random bits using SAT solvers
SAT solvers RSA partial key exposure factoring public-key cryptography
2013/2/21
SAT solvers are being used more and more in Cryptanalysis, with mixed results regarding their efficiency, depending on the structure of the algorithm they are applied. However, when it comes to intege...
Overview of Turbo-Code Reconstruction Techniques
Turbo-Code Reconstruction Techniques recursive systematic coders turbo-code encoders
2009/6/11
In this paper we analyze different techniques to
blindly recover the parameters of turbo-code encoders with only
the knowledge of noisy eavesdropped binary stream. We compare
different strategies t...
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
Cryptanalysis Augot and Finiasz cryptosystem Polynomial Reconstruction Problem
2009/4/10
At Eurocrypt 2003, Augot and Finiasz proposed a new public-key encryp-
tion scheme based on the polynomial reconstruction problem [1]. The scheme was subse-
quently broken in [5], who showed that gi...
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
Trace Operator Polynomial Reconstruction Cryptosystem Eurocrypt
2009/4/10
In this paper, we present a modication of the Augot-Finiasz
cryptosystem presented at EUROCRYPT 2003. Coron managed to design
an attack against the original cryptosystem enabling an attacker
to de...
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
public-key encryption scheme polynomial reconstruction problem
2009/4/8
We describe a cryptanalysis of a public-key encryption scheme based on the
polynomial reconstruction problem . Given the public-key and a ciphertext, we recover
the corresponding plaintext in polyno...
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
Polynomial-Reconstruction Public-Key System Optimal Parameter Choice
2009/3/27
Recently, Augot and Finiasz presented a coding theoretic public key cryptosystem that
suggests a new approach for designing such systems based on the Polynomial Reconstruc-
tion Problem. Their crypt...