搜索结果: 1-9 共查到“军事学 Trade-off”相关记录9条 . 查询时间(0.447 秒)
Threshold Implementations of GIFT: A Trade-off Analysis
Side-channel Threshold Implementation DPA
2017/10/30
Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using dif...
Time-Memory Trade-Off for Lattice Enumeration in a Ball
Lattice Enumeration public-key cryptography
2016/3/1
Enumeration algorithms in lattices are a well-known technique for solving the Short Vector Problem (SVP) and improving blockwise lattice reduction algorithms. Here, we propose a new algorithm for enum...
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
Gaussian Sampling Practicality
2014/3/10
Several lattice-based cryptosystems require to sample from a discrete Gaussian distribution over the integers. Existing methods to sample from such a distribution either need large amounts of memory o...
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
implementation
2012/3/26
Several types of countermeasures against side-channel attacks are known. The one called masking is of great interest since it can be applied to any protocol and/or algorithm, without nonetheless requi...
Trade-Off Between Key Size and Efficiency in Universal Hashing Using Polynomials
universal hash function Polynomials
2009/6/11
Consider the following universal hashing set-up. Let IF be a finite field and suppose any
message consists of at most 230 elements of IF. Suppose further that a collision bound of 2128 is
...
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
block cipher meet-in-the-middle time-memory-data tradeoff
2009/6/11
In this paper, we present several new attacks on multiple
encryption block ciphers based on the meet-in-the-middle attack. In the
first attack (GDD-MTM), we guess a certain number of secret key bits...
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
Time-Data-Memory Trade-Off Cryptanalysis Broadcast Encryption Schemes
2009/1/22
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes.
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
one-way function time/memory trade-off cryptanalysis
2008/11/13
In 1980, Hellman introduced a time/memory trade-off (TMTO) algorithm satisfying the
TMTO curve TM2 = N2, where T is the online time, M is the memory and N is the size
of the search space. Later work...
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
Time-memory-data trade-off attack Maiorana-McFarland functions
2008/8/20
In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter
function generators and filter cominers based on Maiorana-McFarland functions. This can be
considered a...