搜索结果: 1-14 共查到“军队指挥学 optimization”相关记录14条 . 查询时间(1.266 秒)
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
HMAC-SHA-1 Password-Based Key Derivation Function 2 Boyar-Peralta heuristic
2018/1/29
PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case ...
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Code-based cryptosystems MDPC
2018/1/2
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based on problems that remain intractable even...
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
AES FPGA Authenticated Encryption
2017/10/25
In this paper, we investigate the efficiency of FPGA implementations of AES and AES-like ciphers, specially in the context of authenticated encryption. We consider the encryption/decryption and the au...
In 2009, Gentry proposed the first Fully Homomorphic Encryption (FHE) scheme, an
extremely powerful cryptographic primitive that enables to perform computations, i.e., to
evaluate circuits, on encry...
Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing
glitch power glitch filter unrolled block ciphers
2016/12/7
Energy consumption of block ciphers is critical in resource constrained devices. Unrolling has been explored in literature as a technique to increase efficiency by eliminating energy spent in loop con...
In this article we focus on constructing an algorithm that automatizes the generation of LPN solving algorithms from the considered parameters. When searching for an algorithm to solve an LPN instance...
As a modified version of GGH map, Gu map-1 was successful
in constructing multi-party key exchange (MPKE). In this short paper
we present a result about the parameter setting of Gu map-1, therefore
...
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
applications Physical Unclonable Functions
2015/12/29
This paper proposes a theoretical study and a full overview of the design, evaluation and optimization of a PUF based on transient element ring oscillators (TERO-PUF). We show how, by following some s...
A note on the optimality of frequency analysis vs. ℓp-optimization
Property-Preserving Encrypted Databases
2015/12/18
Naveed, Kamara, and Wright’s recent paper “Inference Attacks on Property-Preserving Encrypted
Databases” (ACM-CCS 2015) evaluated four attacks on encrypted databases, such as those based
on the desi...
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Path Oblivious RAM secure processor integrity verification
2013/4/18
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy in these settings is to use tamper-resistant processors. Users' pr...
Analysis and optimization of elliptic-curve single-scalar multiplication
optimization elliptic-curve single-scalar multiplication I/M ratio
2009/6/2
Let P be a point on an elliptic curve over a finite field of large
characteristic. Exactly how many points 2P, 3P, 5P, 7P, 9P, . . . ,mP should be
precomputed in a sliding-window computation of nP? ...
Classification of genus 2 curves over F2n and optimization of their arithmetic
hyperelliptic curve cryptography genus 2 characteristic2
2009/3/26
To obtain efficient cryptosystems based on hyperelliptic curves, we
studied genus 2 isomorphism classes of hyperelliptic curves in characteristic
2. We found general and optimal form for these curve...
Analysis and optimization of elliptic-curve single-scalar multiplication
Analysis and optimization of elliptic-curve single-scalar multiplication
2008/5/21
Let P be a point on an elliptic curve over a finite field of large
characteristic. Exactly how many points 2P, 3P, 5P, 7P, 9P, . . . ,mP should be
precomputed in a sliding-window computation of nP? ...