搜索结果: 1-14 共查到“军队指挥学 Cryptographic Applications”相关记录14条 . 查询时间(0.087 秒)
Reproducible Codes and Cryptographic Applications
code-based cryptography structured codes
2018/7/16
In this paper we study structured linear block codes, starting from well known examples and generalizing them to a wide class of codes that we call reproducible codes. These codes have the property th...
Cryptographic primitives from coding theory are some of the most promising candidates for NIST's Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques ...
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications
trapdoor function CVP lattice
2017/10/16
In this paper, we propose new classes of trapdoor functions to solve the closest vector problem in lattices. Specifically, we construct lattices based on properties of polynomials for which the closes...
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Coppersmith's method lattices polynomial congruences
2016/12/9
We draw a new connection between Coppersmith's method for finding small solutions to polynomial congruences modulo integers and the capacity theory of adelic subsets of algebraic curves. Coppersmith's...
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
(Sparse) Walsh-Hadamard Transform Linear cryptanalysis Bias analysis
2016/5/3
Walsh-Hadamard transform is used in a wide variety of scientific and engineering applications, including bent functions and cryptanalytic optimization techniques in cryptography. In linear cryptanalys...
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
Symmetric Cryptography MDS Diffusion Layer Group
2016/1/26
In this paper, we investigate matrices acting on finite commutative groups and rings; in fact, we study modules on ring of matrices over Z_N and also modules over the ring (F_2^t,\oplus,\land); these ...
Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications)
foundations / cryptographic-key management TTP Web of Trust PKI
2012/3/28
We propose generic declarative definitions of individual and collective trust relations between interacting agents and agent collections, and trust domains of trust-related agents in distributed syste...
Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications
foundations / cryptographic-key management TTP Web of Trust PKI
2011/6/8
We propose generic declarative definitions of the concepts of weak and strong trust relations between interacting agents, and trust domains of trust-related agents in distributed or multi-agent system...
Properties of the Discrete Differential with Cryptographic Applications
Matsumoto-Imai multivariate public key cryptography discrete differential
2009/12/29
Recently, the C¡ signature scheme has been completely bro-
ken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and
other multivariate public key systems have been impaired. T...
Extended Access Structures and Their Cryptographic Applications
vector space access structure secret sharing dynamic distributed encryption
2009/6/10
As our first contribution, we give an explicit construction of an extended access
structure 0 starting from a vector space access structure , and we prove that
0 is als...
Divisibility, Smoothness and Cryptographic Applications
cryptography Smoothness Cryptographic Applications
2009/6/9
This paper deals with products of moderate-size primes, familiarly
known as smooth numbers. Smooth numbers play an crucial role in
information theory, signal processing and cryptography.
We present...
The use of FPGAs for cryptographic applications is highly
attractive for a variety of reasons but at the same time there are many
open issues related to the general security of FPGAs. This contribut...
Long Modular Multiplication for Cryptographic Applications
Computer Arithmetic Cryptography Modular multiplication
2009/3/27
A digit-serial, multiplier-accumulator based cryptographic co-processor architecture is proposed, similar to fix-point DSP's with enhance-ments, supporting long modular arithmetic and general computat...
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
Polyhedrons Finite Abelian Groups Cryptographic Applications
2009/1/15
The algebraic method for stream-cipher key recovering was developed
in [5]. The essence of this method is in solving the system of nonlinear equations
which are the simplified consequences of the en...