搜索结果: 1-15 共查到“军事学 Layer”相关记录26条 . 查询时间(0.25 秒)
Experience shows that most researchers and developers tend to treat plain-domains (those that are not prefixed with “www” sub-domains, e.g. “example.com”) as synonyms for their equivalent www-domains ...
Optimizing Transport Layer for Secure Computation
Framework Transport layer Garbled circuits Implementation
2019/7/22
Transport layer: Although significantly improved, the performance of 2PC is still prohibitive for practical systems. Contrary to the common belief that bandwidth is the remaining bottleneck for 2PC im...
Afgjort -- A Semi-Synchronous Finality Layer for Blockchains
blockchain finality Byzantine agreement
2019/5/21
Most existing blockchains either rely on a Nakamoto-style of consensus, where the chain can fork and produce rollbacks, or on a committee-based Byzantine fault tolerant (CBFT) consensus, where no roll...
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
cryptographic protocols electronic commerce and payment blockchain
2019/4/3
Blockchain based systems, in particular cryptocurrencies, face a serious limitation: scalability. This holds, especially, in terms of number of transactions per second. Several alternatives are curren...
Spread: a new layer for profiled deep-learning side-channel attacks
Deep-learning Side-channel attacks Spread layer
2018/11/13
Recent publications, such as [10] and [13], exploit the advantages of deep-learning techniques in performing Side-Channel Attacks. One example of the Side-Channel community interest for such technique...
NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary
2nd layer protocols blockchain scalability
2018/7/9
Bitcoin is meant to offer a payment system where the users are custodians of their funds instead of entrusting a trusted financial institution. The limited transaction throughput of such permissionles...
Partially specified channels: The TLS 1.3 record layer without elision
cryptographic standards TLS 1.3 stream-based channels
2018/7/2
This work advances the study of secure stream-based channels (Fischlin et al., CRYPTO ’15) by considering the multiplexing of many data streams over a single channel. This is an essential feature of r...
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
secure ranging physical layer security
2017/12/25
Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation o...
Improvements to the Linear Layer of LowMC: A Faster Picnic
LowMC efficient implementation Picnic
2017/11/28
Picnic is a practical approach to digital signatures where the security is largely based on the existence of a one-way function, and the signature size strongly depends on the number of multiplication...
Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
Outsourcing Computation machine learning techniques
2017/5/12
With the synchronous development of both cloud computing and machine learning techniques, the clients are preferring to resort to the cloud server with substantial resources to train learning model. H...
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Skinny block cipher Midori block cipher MILP
2017/3/6
In this paper, we propose an accurate security evaluation methodology for block ciphers with a binary diffusion layers against division cryptanalysis. We illustrate the division property by the indepe...
Implementing and Proving the TLS 1.3 Record Layer
implementation provable security transport layer security
2017/1/3
The record layer is the main bridge between TLS applications and internal sub-protocols. Its core functionality is an elaborate authenticated encryption: streams of messages for each sub-protocol (han...
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Toeplitz matrix MDS matrix XOR count
2016/12/10
MDS matrices are used as building blocks of diffusion layers in block
ciphers, and XOR count is a metric that estimates the hardware implementation cost.
In this paper we report the minimum value of...
Physical Layer Group Key Agreement for Automotive Controller Area Networks
Automotive security ECU keys CAN bus
2016/6/8
Distribution of cryptographic keys between devices communicating over a publicly accessible medium is an important component of secure design for networked systems. In this paper, we consider the prob...
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Perfect diffusion Recursive diffusion layer
2016/1/26
Diffusion layers, and specially perfect diffusion layers, are very important
subject for cryptographic research. Main quest is a perfect diffusion
layer with more optimal hardware and/or software im...