搜索结果: 1-15 共查到“军队指挥学 Method”相关记录100条 . 查询时间(0.156 秒)
A new elliptic curve point compression method based on Fp-rationality of some generalized Kummer surfaces
elliptic cryptography point compression Barreto-Naehrig curves
2019/9/19
In the article we propose a new compression method (to 2log2(p)+32log2(p)+3 bits) for the Fp2Fp2-points of an elliptic curve Eb:y2=x3+bEb:y2=x3+b (for b∈F∗p2b∈Fp2∗) of jj-invariant ...
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Intersection of Curves Grobner Basis Vanishing Ideals
2019/9/19
In this paper, we intend to study the geometric meaning of the discrete logarithm problem defined over an Elliptic Curve. The key idea is to reduce the Elliptic Curve Discrete Logarithm Problem (EC-DL...
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
A Fast Characterization Method for Optical Fault Injection
Physical attacks Fault injection Fast space characterization
2019/7/26
Semi-invasive fault injection attacks, such as optical fault injection, are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selectio...
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Elliptic curves formal groups degenerate curves
2019/5/21
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attack...
A Method to Reduce the Key Size of UOV Signature Scheme
digital signatures public-key cryptography
2019/5/13
Multivariate public key signature scheme has a good performance on speed and signature size. But most of them have a huge public key size. In this paper, we propose a new method to reduce the public k...
Cube attack is an important cryptanalytic technique against symmetric cryptosystems, especially for stream ciphers. The key step in cube attack is recovering superpoly. However, when cube size is larg...
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Isogeny Post-quantum cryptography Montgomery curves
2019/2/27
In this paper, we present an efficient method to compute arbitrary odd-degree isogenies on Edwards curves. By using the ww-coordinate, we optimized the isogeny formula on Edwards curves by Moody \text...
New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves
Isogeny Post-quantum cryptography Montgomery curves
2018/12/24
Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. Whi...
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
Division property using three subsets Integral distinguisher MILP
2018/12/11
Division property is a generalized integral property proposed by Todo at EUROCRYPT 2015, and then conventional bit-based division property (CBDP) and bit-based division property using three subsets (B...
Deterministic Cube Attacks: A New Method to Recover Superpolies in Practice
Trivium cube attacks key recovery attack
2018/11/12
Cube attacks are an important type of key recovery attacks against NFSR-based cryptosystems. The key step in cube attacks closely related to key recovery is recovering superpolies. However, in the pre...
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the χ2 Method
random permutation indifferentiable security χ2 method
2018/3/6
The construction XORPXORP (bitwise-xor of outputs of two independent nn-bit random permutations) has gained broad attention over the last two decades due to its high security.
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Vehicular communications security Security Credential Management System (SCMS)
2018/3/6
Vehicular communication (V2X) technologies are expected to become increasingly common in the future. Although they enable improvements on transportation safety and efficiency, the large scale deployme...
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Dynamic threshold Linear subspace Forging
2017/11/14
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn et.al., in 2015. In this scheme, a (t; n) secret sharing scheme in secret reconstruction phase can t...
Privacy Buckets: A numeric method for k-fold tight differential privacy
differential privacy foundations,composition
2017/10/30
The robustness of (approximate) differential privacy (DP) guarantees in the presence of thousands and even hundreds of thousands observations is crucial for many realistic application scenarios, such ...