搜索结果: 1-13 共查到“军事学 alternative”相关记录13条 . 查询时间(0.025 秒)
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
Differential Attacks: Using Alternative Operations
block ciphers differential cryptanalysis distinguisher
2017/6/27
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed ...
Alternative Implementations of Secure Real Numbers
Secure fixed- and floating-point arithmetic privacy-preserving data analysis secure computations
2016/12/10
This paper extends the choice available for secure real number implementations with two new contributions. We will consider the numbers represented in form a−φba−φb where φφ is the golden ...
Network Deprived SNA : An Alternative To Anonymization
Privacy preserving social network analysis secure multi- party computation centrality measures
2016/5/3
Social network analysis as a technique has been applied to
diverse set of fields, including, organizational behavior, sociology, economics
and biology. However, for sensitive networks such as hate n...
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Practical Alternative Government Decryption Backdoors
2016/3/7
A cryptographic contract and enforcement technology would guarantee release of a data
decryption key to an authorized party if and only if predetermined contract
requirements are satisfied. Threshol...
In this paper, we introduce a new class of double-block-length hash functions. Using the
ideal cipher model, we prove that these hash functions, dubbed MJH, are asymptotically collision
resistant up...
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
concurrent zero-knowledge non-black-box simulation
2016/1/4
We give a new proof of the existence of public-coin concurrent zero-knowledge arguments for
NP in the plain model under the existence of collision-resistant hash function families, which was
origina...
Alternative cubics' rules with an algebraic appeal
public-key cryptography elliptic curve
2015/12/30
Two alternating vector operations on a cubic hypersurface are given
simple expressions. Direct use of the first operation’s expression seems
less efficient than state-of-the-art elliptic curve crypt...
We propose a new Elliptic curve at a security level signi-
cantly greater than the standard 128 bits, that lls a gap in current proposals
while bucking the expected security vs cost curve by explo...
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
stream cipher distinguishing attack
2014/3/6
We present a new Cryptographically Secure Pseudo-Random Number Generator. It uses permutations as its internal state, similarly to the RC4 stream cipher. We describe a statistical test which revealed ...
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Public Key Cryptography Alternative algebra lattice based cryptography
2009/9/27
In this paper, we show that the fundamental concepts behind the Ntr¹u cryptosystem can
be extended to a broader algebra than Dedekind domains. Also, we present an abstract and
generalized algor...
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Public Key Cryptography Alternative algebra lattice based cryptography
2009/9/22
In this paper, we show that the fundamental concepts behind the Ntr¹u cryptosystem can
be extended to a broader algebra than Dedekind domains. Also, we present an abstract and
generalized algor...
On alternative approach for verifiable secret sharing
alternative approach verifiable secret sharing
2009/4/8
approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants.
The participants interact (no thir...