搜索结果: 1-15 共查到“军事学 flexible”相关记录23条 . 查询时间(0.039 秒)
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Bitslicing Side-channel attacks Fault attacks
2019/7/8
We describe SKIVA, a customized 32-bit processor enabling the design of software countermeasures for a broad range of implementation attacks covering fault injection and side-channel analysis of timin...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Cloud Security Storage Protection Access Control
2018/12/19
Secure cloud storage is considered one of the most important issues that both businesses and end-users are considering before moving their private data to the cloud. Lately, we have seen some interest...
A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers
anonymity ring signature k-out-of-n property flexible participation
2018/8/10
A kk-out-of-nn ring signature is a kind of anonymous signature that can be performed by any member in a group. This signature allows the creation of valid signatures if and only if actual signers more...
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
blockchain protocol hybrid consensus scalability
2018/5/11
Proof of Work (PoW), a fundamental blockchain protocol, has been widely applied and thoroughly testified in various decentralized cryptocurrencies, due to its intriguing merits including trustworthy s...
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Partial Verification Unpredictable Resource constraints Trade-off
2018/4/17
This work introduces the concept of flexible signatures. In a flexible signature scheme, the verification algorithm quantifies the validity of a signature based on the number of computations performed...
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version)
flexible public key equivalence classes stealth addresses
2018/3/5
This primitive offers a unified approach to the modular construction of signature schemes with privacy-preserving components. Namely, we show how to build the first ring signature scheme in the plain ...
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance
SSE cryptographic protocols
2017/11/21
Searchable Symmetric Encryption (SSE) has been widely applied in the design of encrypted database for exact queries or even range queries in practice. In spite of its efficiency and functionalities, i...
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Group-based Secure Communication Ciphertext-Policy Attribute-Based Encryption ID Revocation
2017/11/20
Ciphertext-Policy Attribute-Based Encryp- tion (CP-ABE) is an access control mechanism over encrypted data and well suited for secure group-based communication. However, it also suffers from the fol- ...
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Attribute-Based Access Control Encryption CP-ABE
2017/11/20
Ciphertext Policy Attribute-Based Encryption (CP- ABE) has been proposed to implement the attribute-based access control model. In CP-ABE, data owners encrypt the data with a certain access policy suc...
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
WSN lightweight block cipher DDT
2016/12/12
In this paper, we analyzed an extreme case of lightweight block cipher design in terms of security and efficiency. To do this, we proposed ELiF block cipher family which has one of the smallest hardwa...
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
PKEET public-key cryptography
2016/3/14
In recent years, public key encryption with equality test (PKEET) has become
a hot research topic in the cryptography community due to the advancement of cloud
computing. Recently, Ma et al. propose...
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
secure outsourcing algorithm bilinear pairings one-malicious model
2016/2/24
Outsourcing paradigm has become a hot research topic in the cryptography
community, where computation workloads can be outsourced to cloud servers by the
resource-constrained devices, such as RFID t...
FleXOR: Flexible garbling for XOR gates that beats free-XOR
cryptographic protocols garbled circuits
2016/1/9
Most implementations of Yao’s garbled circuit approach for 2-party secure computation
use the free-XOR optimization of Kolesnikov & Schneider (ICALP 2008). We introduce an
alternative technique call...
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
membership encryption priced oblivious transfer universally composable security
2016/1/8
Membership encryption is a newly developed cryptographic primitive that combines
membership proof and encryption into an unified setting. This paper presents a new flexible membership
encryption sch...