搜索结果: 1-9 共查到“军事学 cryptographic schemes”相关记录9条 . 查询时间(0.117 秒)
Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes
Lattice based cryptography Digital Signatures post quantum cryptography
2018/3/5
This paper proposes a simple single bit flip fault attack applicable to several LWE (Learning With Errors Problem) based lattice based schemes like KYBER, NEWHOPE, DILITHIUM and FRODO which were submi...
In this paper we consider both ``OR" and ``XOR" based monochrome random grid visual cryptographic schemes (RGVCS) for tt-(k,n)∗(k,n)∗ access structure which is a generalization of the thre...
SM9 is a Chinese official cryptography standard which defines a set of identity-based cryptographic schemes from pairings. This report describes the technical specification of SM9 as a reference for t...
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
ASASA multivariate cryptography white-box cryptography
2016/1/9
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the ASASA structure
ranging ...
Implementation Attacks on Post-Quantum Cryptographic Schemes
Implementation Attacks Post-Quantum Cryptographic Schemes
2015/12/21
Post-quantum cryptographic schemes have been developed
in the last decade in response to the rise of quantum computers. Fortunately,
several schemes have been developed with quantum resistance.
How...
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. ...
Remarks on Some Quantum Cryptographic Schemes
quantum key establishment quantum secret sharing BB84 scheme
2009/11/18
We remark that the schemes [PhysRevLett.98.020503, PhysRevA.74.012315,
PhysRevA.71.022321, PhysRevA.72.012304, PhysRevA.69.052307, PhysRevA.59.1829]
are not secret sharing schemes as claimed.
Attacking Cryptographic Schemes Based on “Perturbation Polynomials”
Attacking Cryptographic Schemes Perturbation Polynomials sensor networks
2009/6/12
We show attacks on several cryptographic schemes that have recently been proposed for
achieving various security goals in sensor networks. Roughly speaking, these schemes all use
“perturbation polyn...
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
Cryptographic Schemes Applications to Protocols
2009/1/13
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, sign...