搜索结果: 1-15 共查到“Noisy”相关记录107条 . 查询时间(0.054 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Estimating Factor-Based Spot Volatility Matrices with Noisy and Asynchronous High-Frequency Data
噪声 异步高频 数据估算 因子 现货波动率 矩阵
2023/5/4
On the Commitment Capacity of Unfair Noisy Channels
Commitment capacity unconditionally secure cryptography unfair noisy channels
2019/5/28
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivi...
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
secret sharing non-malleability leakage resilience computational security
2019/2/27
We revisit the concept of *non-malleable* secret sharing (Goyal and Kumar, STOC 2018) in the computational setting. In particular, under the assumption of one-to-one one-way functions, we exhibit a *c...
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
key exchange key encapsulation mechanism post-quantum cryptography
2018/11/13
A multitude of post-quantum key encapsulation mechanisms (KEMs) and public key encryption (PKE) schemes implicitly rely on a protocol by which Alice and Bob exchange public messages and converge on se...
Extracting Linearization Equations from Noisy Sources
Multivariate Cryptography HMFEv Q-rank
2018/6/5
This note was originally written under the name ``On the Security of HMFEv'' and was submitted to PQCrypto 2018. The author was informed by the referees of his oversight of an eprint work of the same ...
How to Securely Compute with Noisy Leakage in Quasilinear Complexity
Side-Channel Attacks Noisy Leakage Model Provable Security
2017/9/25
Since their introduction in the late 90's, side-channel attacks have been considered as a major threat against cryptographic implementations. This threat has raised the need for formal leakage models ...
Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
Approximate polynomial common divisor problem noisy multipolynomial reconstruction polynomial lattice
2017/4/17
In this paper, we investigate the hardness of the approximate polynomial common divisor problem, which is regarded as a polynomial analogy of the approximate integer common divisor problem. In order t...
Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated re...
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
cryptanalysis RSA
2016/12/7
From the proposal of key-recovery algorithms for RSA secret key from its noisy version at Crypto2009, there have been considerable researches on RSA key recovery from discrete noise. At CHES2014, two ...
TSUNAMI LEAD WAVE RECONSTRUCTION BASED ON NOISY SEA SURFACE HEIGHT MEASUREMENTS
Tsunami lead wave reconstruction Wavelet theory Sea surface height measurement GNSS reflectometry
2016/7/5
This paper presents a Tsunami lead wave reconstruction method using noisy sea surface height (SSH) measurements such as observed by a satellite-carried GNSS reflectometry (GNSS-R) sensor. It is propos...
A GENERIC PROBABILISTIC MODEL AND A HIERARCHICAL SOLUTION FOR SENSOR LOCALIZATION IN NOISY AND RESTRICTED CONDITIONS
Generic Probabilistic Localization Model Bundle Adjustment Kalman Filtering Particle Filtering
2016/7/4
A generic probabilistic model, under fundamental Bayes’ rule and Markov assumption, is introduced to integrate the process of mobile platform localization with optical sensors. And based on it, three ...
Secure Computation from Elastic Noisy Channels
elastic noisy channels unfair noisy channels secure computation
2016/5/23
Noisy channels enable unconditionally secure multi-party computation even against parties with unbounded computational power. But inaccurate noise estimation and adversarially determined channel chara...
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
oblivious transfer elastic channels key agreement
2016/2/23
A (γ,δ)-elastic channel is a binary symmetric channel between a sender and a receiver where the error rate of an honest receiver is δ while the error rate of a dishonest receiver lies within the inter...
Unifying Leakage Models: from Probing Attacks to Noisy Leakage
foundations Leakage resilience
2016/1/26
A recent trend in cryptography is to formally show the leakage resilience of cryptographic
implementations in a given leakage model. One of the most prominent leakage models –
the so-called bounded ...
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
RSA Key-Recovery Cold Boot Attack Side Channel Attack
2016/1/8
We discuss how to recover RSA secret keys from noisy analog data obtained through physical attacks such as cold boot and side channel attacks. Many studies have focused on recovering correct secret ke...