搜索结果: 1-4 共查到“军事学 know-how”相关记录4条 . 查询时间(0.026 秒)
What users should know about Full Disk Encryption based on LUKS
Linux Unified Key Setup (LUKS) Password-Based Key Derivation Function 2 (PBKDF2) Full Disk Encryption (FDE)
2016/3/11
Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could reveal business secrets...
Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Privacy enhancing technologies social networks
2014/3/7
The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust a...
Constructing differential 4-uniform permutations from know ones
applications / vectorial boolean function differential uniformity nonlinearity CCZ-equivalence almost perfect nonlinear (APN)
2012/3/29
It is observed that exchanging two values of a function over ${\mathbb F}_{2^n}$, its differential uniformity and nonlinearity change only a little. Using this idea, we find permutations of differenti...
A new method for constructing differential 4-uniform permutations from know ones
vectorial boolean function differential uniformity nonlinearity CCZ-equivalence almost perfect nonlinear (APN)
2011/2/23
It is observed that exchanging two values of a function over $\mathbb{F}_{2^n}$, its differential uniformity and nonlinearity change only a little. Using this idea, we find permutations of differentia...