搜索结果: 1-4 共查到“军队指挥学 perturbation”相关记录4条 . 查询时间(0.109 秒)
On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud
half-space query data perturbation cloud computing
2012/6/14
Secure data intensive computing in the cloud is challenging, involving a complicated tradeoff among security, performance, extra costs, and cloud economics. Although fully homomorphic encryption is co...
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
DSA exponentiation fault injection public modulus lattice reduction
2010/11/22
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do not seem critical must ...
Attacking Cryptographic Schemes Based on “Perturbation Polynomials”
Attacking Cryptographic Schemes Perturbation Polynomials sensor networks
2009/6/12
We show attacks on several cryptographic schemes that have recently been proposed for
achieving various security goals in sensor networks. Roughly speaking, these schemes all use
“perturbation polyn...
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
public key cryptosystem multivariate polynomial multivariate public key cryptosystem
2009/6/5
The piece in hand (PH) is a general scheme which is applicable to any
reasonable type of multivariate public key cryptosystems for the purpose of enhancing
their security. In this paper, we propose ...