搜索结果: 1-7 共查到“军事学 independence”相关记录7条 . 查询时间(0.117 秒)
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Statistical and Linear Independence of Binary Random Variables
Xiao-Massey lemma block cipher linear cryptanalysis
2017/5/23
Linear cryptanalysis makes use of statistical models that consider linear approximations over block cipher and random permutation as binary random variables. In this note we show that linear and stati...
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
PRF XOF game playing
2016/3/18
We provide new bounds for the pseudo-random function security
of keyed sponge constructions. For the case c ≤ b/2 (c the capacity
and b the permutation size), our result improves over all previously...
We will introduce different notions of independence, especially computational independence (or more precise independence by polynomial-size circuits (PSC)), which is the analog to computational indist...
We study ballot secrecy and ballot independence for election schemes.
First, we propose a definition of ballot secrecy as an indistinguishability
game in the computational model of cryptography. Our...
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
oblivious RAM ORAM oblivious data structures
2015/12/21
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is
the first ORAM to allow varying block sizes without trivial padding. We also present a new historyindepend...
We study ballot independence for election schemes:
* We formally define ballot independence as a cryptographic game and prove that ballot secrecy implies ballot independence.
* We introduce a notion...