搜索结果: 1-11 共查到“军事学 Tradeoffs”相关记录11条 . 查询时间(0.078 秒)
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
searchable encryption lower bound
2019/6/13
Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, ...
Visualizing size-security tradeoffs for lattice-based encryption
lattice-based cryptography security estimates network traffic
2019/6/5
There are many proposed lattice-based encryption systems. How do these systems compare in the security that they provide against known attacks, under various limits on communication volume? There are ...
A searchable symmetric encryption (SSE) scheme enables a client to store data on an untrusted server while supporting keyword searches in a secure manner. Recent experiments have indicated that the pr...
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling
memory-hard functions pebbling space-time trade-offs
2018/3/5
Pebble games were originally formulated to study time-space tradeoffs in computation, modeled by games played on directed acyclic graphs (DAGs). Close connections between pebbling and cryptography hav...
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Cryptanalysis block cipher time-memory-data tradeof
2016/1/7
The FX-construction was proposed in 1996 by Kilian and
Rogaway as a generalization of the DESX scheme. The construction increases
the security of an n-bit core block cipher with a κ-bit key by using...
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Attribute-based encryption doubly spatial encryption generic conversion
2015/12/30
Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such a...
Transaction processing speed is one of the major considerations in cryptocurrencies that are
based on proof of work (POW) such as Bitcoin. At an intuitive level it is widely understood that
processi...
The Cost of False Alarms in Hellman and Rainbow Tradeoffs
time memory tradeoff Hellman rainbow table
2009/6/5
Cryptanalytic time memory tradeoff algorithms are generic one-way function
inversion techniques that utilize pre-computation. Even though the online time
complexity is known up to a small multiplica...
Some Thoughts on Time-Memory-Data Tradeoffs
Time-Memory-Data Tradeoffs Hellman Time-Memory tradeoff
2009/2/16
In this paper we show that Time-Memory tradeoff by Hell-
man may be extended to Time-Memory-Key tradeoff thus allowing at-
tacks much faster than exhaustive search for ciphers for which typically
i...
Some of the existing time memory tradeoff attacks (TMTO)
on specific systems can be reinterpreted as methods for inverting general
oneway functions. We apply these methods back to specific systems i...
Recently, Juels and Weis defined strong privacy for RFID
tags. We add to this definition a completeness and a soundness requirement,
i.e., a reader should accept valid tags and only such tags. For ...