搜索结果: 1-15 共查到“军事学 Big”相关记录15条 . 查询时间(0.075 秒)
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Random oracle model bounded retrieval model big-key cryptography
2018/3/5
Towards advancing the use of BIG keys as a practical defense against key exfiltration, this paper provides efficiency improvements for cryptographic schemes in the bounded retrieval model (BRM). We id...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity
cryptographic protocols secure tow-party protocol
2017/1/3
Electronic information is increasingly often shared among unreliable entities. In this context, one interesting problem involves two parties that secretly want to determine intersection of their respe...
Secure multi-party computation (MPC) allows multiple parties to perform a joint computation without disclosing their private inputs. Many real-world joint computation use cases, however, involve data ...
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Access Control Attribute-based Encryption Policy Updating
2016/7/5
How to flexibly change the access policy after the initial data access policy has
been set is a critical problem to promote attribute-based encryption (ABE) from a theoretical
tool to a practical to...
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)
Boolean functions APN Butterfly structure
2016/6/2
The existence of Almost Perfect Non-linear (APN) permutations
operating on an even number of bits has been a long standing open
question until Dillon et al., who work for the NSA, provided an exampl...
Big-Key Symmetric Encryption: Resisting Key Exfiltration
Big key cryptography bounded retrieval model key exfiltration
2016/6/2
This paper aims to move research in the bounded retrieval model (BRM) from theory to
practice by considering symmetric (rather than public-key) encryption, giving efficient schemes,
and providing se...
As big data collection and analysis becomes prevalent in today’s computing environments there is a growing need for techniques to ensure security of the collected data. To make matters worse, due to i...
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Oblivious RAM Secure Two-Party Computation Garbled Circuits
2016/1/26
We present a novel mechanism that allows a client to securely outsource his
private data to the cloud while at the same time to delegate to a third party the right to
run certain algorithms on his d...
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
public auditing integrity verification cloud computing
2016/1/9
Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent p...
Improving the Big Mac Attack on Elliptic Curve Cryptography
implementation side channel attacks
2015/12/23
At CHES 2001, Walter introduced the Big Mac attack against an implementation of RSA. It is an horizontal collision attack, based on the detection of common operands in two multiplications. The attack ...
Big data security analytics is an emerging approach to intrusion detection at the scale of a large organization. It involves a combination of automated and manual analysis of security logs and alerts ...
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
cryptographic protocols
2014/3/10
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern applications, and how to scal...
We introduce a message attack against DSA and show that the security of
DSA is indeed reduced to the following problem, i.e., find µ 2 Zq such that
z = (^gµ mod p)mod q where Ordp(^g) = ...