搜索结果: 1-7 共查到“军队指挥学 Key Leakage”相关记录7条 . 查询时间(0.093 秒)
A Key Leakage Preventive White-box Cryptographic Implementation
white-box cryptography gray-box attacks
2018/11/2
A white-box cryptographic implementation is to defend against white-box attacks that allow access and modification of memory or internal resources in the computing device. In particular, linear and no...
Weak-Key Leakage Resilient Cryptography
weak key-leakage attacks public-key encryption scheme chosen-ciphertext security
2016/1/25
In traditional cryptography, the standard way of examining the security of a scheme is to
analyze it in a black-box manner, capturing no side channel attacks which exploit various forms
of unintende...
A Bitcoin wallet is a set of private keys known to a user and
which allow that user to spend any Bitcoin associated with those keys. In
a hierarchical deterministic (HD) wallet, child private keys a...
Certificate-Based Encryption Resilient to Key Leakage
certificate-based encryption master secret key leakage dual system encryption
2015/12/31
Certificate-based encryption (CBE) is an important class of public key encryption but the
existing schemes are secure only under the premise that the decryption key (or private key) and master
priva...
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
DSA exponentiation fault injection public modulus lattice reduction
2010/11/22
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do not seem critical must ...
Most of the work in the analysis of cryptographic schemes is concentrated in abstract ad-
versarial models that do not capture side-channel attacks. Such attacks exploit various forms
of unintended ...
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Bias Cryptanalysis Keystream Key Leakage RC4 Stream Cipher
2008/8/18
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key
Scheduling Algorithm (KSA) of RC4, the initial bytes of the permutation, i.e., S[y]
for small values of y are biased to...