搜索结果: 1-15 共查到“军事学 direct”相关记录26条 . 查询时间(0.032 秒)
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Direct anonymous attestation TPM 2.0 implementation Anonymous signatures
2018/11/29
Direct Anonymous Attestation (DAA) is an anonymous signature scheme, which is designed to allow the Trusted Platform Module (TPM), a small chip embedded in a host computer, to attest to the state of t...
Polynomial direct sum masking to protect against both SCA and FIA
Masking countermeasure Error correcting codes Side channel attack
2018/6/5
Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the nineties, many works have shown tha...
L-DAA: Lattice-Based Direct Anonymous Attestation
Lattice based cryptography Direct Anonymous Attestation Universally Composable security model
2018/5/3
Direct Anonymous Attestation (DAA) is an anonymous digi- tal signature that aims to provide both signer authentication and privacy. DAA was designed for the attestation service of the Trusted Platform...
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
public-key cryptography Revocable Attribute-Based Encryption
2018/4/11
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme. We base on the direct revocation approach, by embedding the revocation list into cipherte...
Direct Anonymous Attestation from Lattices
Lattice-based Cryptography Anonymous Signatures DAA
2017/10/25
Direct Anonymous Attestation (DAA) is a complex cryptographic protocol that has been widely deployed in practice, with more than 500 million machines in the market that are already equipped with its h...
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers
Lightweight Cryptography MDS Diffusion Layers Bit-wise Circulant Matrices
2016/12/7
As a core component of Substitution-Permutation Networks, diffusion layer is mainly introduced by matrices from maximum distance separable (MDS) codes. Surprisingly, up to now, most constructions of M...
Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
MDS matrices involutions cyclic codes
2016/12/7
A good linear diffusion layer is a prerequisite in the design of block ciphers. Usually it is obtained by combining matrices with optimal diffusion property over the Sbox alphabet. These matrices are ...
Universally Composable Direct Anonymous Attestation
Direct Anonymous Attestation cryptographic protocols
2016/1/26
Direct Anonymous Attestation (DAA) is one of the most
complex cryptographic algorithms that has been deployed in practice.
In spite of this, and the long body of work on the subject, there is
still...
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Recursive MDS Diffusion Layers Shortened BCH Codes
2016/1/8
MDS matrices allow to build optimal linear diffusion layers in
block ciphers. However, MDS matrices cannot be sparse and usually have
a large description, inducing costly software/hardware implement...
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Masking countermeasure trans-masking fault detection
2016/1/7
Secure elements, such as smartcards or trusted platform modules
(TPMs), must be protected against implementation-level attacks.
Those include side-channel and fault injection attacks. We introduce
...
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Scalable Simulation via Direct Execution Multi-threaded Applications
2015/12/30
We describe a new methodology that enables the direct
execution of multi-threaded applications inside of
Shadow, an existing parallel discrete-event network simulation
framework. Our methodology ut...
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
attribute-based key encapsulation mechanism attribute-based encryption
2014/3/7
We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete c...
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
secret-key cryptography / Authentication Strongly Universal hash functions
2013/4/18
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman\&Carter, in the c...
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Post-quantum cryptography Lattice-based PKE scheme Universal random data padding CCA2-security
2013/4/18
Design efficient Lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed Lattice-based PKE scheme...
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy
public-key cryptography / public key cryptography
2012/3/28
In this work, we study (the direct constructions of) bidirectional proxy re-encryption (PRE) with alleviated trust in the proxy, specifically the master secret security (MSS) and the non-transitivity ...