搜索结果: 1-15 共查到“军事学 Solutions”相关记录21条 . 查询时间(0.091 秒)
Verifying Solutions to LWE with Implications for Concrete Security
lattices learning with errors discrete gaussian sampling
2019/6/21
A key step in Regev's (2009) reduction of the Discrete Gaussian Sampling (DGS) problem to that of solving the Learning With Errors (LWE) problem is a statistical test required for verifying possible s...
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Binary matrix LWE Linear Programming Cryptanalysis
2018/8/16
We consider Galbraith's space efficient LWE variant, where the (m×n)(m×n)-matrix AA is binary. In this binary case, solving a vectorial subset sum problem over the integers allows for decryption. We s...
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
RSA Cryptanalysis Lattice
2018/6/6
We present two attacks on RSA as its applications. One focuses on the case with known bits of the private exponent together with the prime factor, and the other considers the case with a small differe...
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Side-channel attacks masking countermeasure refreshing algorithms
2018/5/28
Refreshing algorithms are a critical ingredient for secure masking. They are instrumental in enabling sound composability properties for complex circuits, and their randomness requirements dominate th...
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
post-quantum cryptography isogeny-based cryptography cryptanalysis
2018/4/26
In this paper, we study several related computational problems for supersingular elliptic curves, their isogeny graphs, and their endomorphism rings. We prove reductions between the problem of path fi...
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
RSA parameter validation zero-knowledge proofs
2018/1/12
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to convince a verifier that a set of RSA parameters is well-structured (e.g., that the modulus is the prod...
Short Solutions to Nonlinear Systems of Equations
signature scheme hard problem post-quantum
2017/12/6
This paper presents a new hard problem for use in cryptography, called Short Solutions to Nonlinear Equations (SSNE). This problem generalizes the Multivariate Quadratic (MQ) problem by requiring the ...
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
homomorphic signatures aggregate signatures genomic privacy
2016/5/20
In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider. In this scenario, (i) the service provide...
PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)
Advanced Metering Infrastructure (AMI) Key Management Physical Unclonable Function (PUF)
2016/1/27
In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems,
we propose an authenticated key exchange protocol and an authenticated message broadcasting protocol. ...
On the Complexity of Finding Low-Level Solutions
Low-Level Solutions public-key cryptography
2016/1/23
On the Complexity of Finding Low-Level Solutions.
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Routing Security Public-key Infrastructure DNS
2016/1/9
Route Origin Verification (ROVER), a mechanism for securing interdomain routing with BGP, is a proposed alternative to the Resource Public Key Infrastructure (RPKI). While the RPKI requires the design...
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Modular Inversion Hidden Number Problem Inversive Congruential Generator
2016/1/6
In this paper we revisit the modular inversion hidden number
problem and the inversive congruential pseudo random number generator
and consider how to more efficiently attack them in terms of fewer
...
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
applied cryptography bitcoin key management
2016/1/6
In this paper we study the question of key management and
practical operational security in bitcoin digital currency storage systems.
We study the security two most used bitcoin HD Wallet key manage...
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
recommender systems homomorphic encryption key recovery attacks
2015/12/31
Nowadays, recommender systems have become an indispensable part of our
daily life and provide personalized services for almost everything. However, nothing is
for free – such systems have also upset...
Problems, solutions and experience of the first international student's Olympiad in cryptography
cryptography block ciphers boolean functions
2015/12/30
A detailed overview of the problems, solutions and experience of the first international student's Olympiad in cryptography, NSUCRYPTO'2014, is given. We start with rules of participation and descript...