搜索结果: 1-10 共查到“军队指挥学 sok”相关记录10条 . 查询时间(0.095 秒)
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockch...
Recently, the NIST launched a competition for lightweight cryptography and a large number of ciphers are expected to be studied and analyzed under this competition. Apart from the classical security, ...
Blockchains have the potential to revolutionize markets and services, yet, currently exhibit high latencies and fail to handle loads comparable to those managed by traditional custodian financial syst...
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
cryptographic protocols electronic commerce and payment blockchain
2019/4/3
Blockchain based systems, in particular cryptocurrencies, face a serious limitation: scalability. This holds, especially, in terms of number of transactions per second. Several alternatives are curren...
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
S-box Survey Design criteria
2019/3/1
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes. Continuously developed for decades, S-bo...
SoK: Modular and Efficient Private Decision Tree Evaluation
Privacy-preserving protocols secure computation homomorphic encryption
2018/11/16
Decision trees and random forests are widely used classifiers in machine learning. Service providers often host classification models in a cloud service and provide an interface for clients to use the...
SoK: A Consensus Taxonomy in the Blockchain Era
Consensus Byzantine agreement blockchain protocols
2018/8/21
Consensus (a.k.a. Byzantine agreement) is arguably one of the most fundamental problems in distributed systems, playing also an important role in the area of cryptographic protocols as the enabler of ...
SoK: The Problem Landscape of SIDH
isogeny-based cryptography post-quantum cryptography SIDH
2018/4/12
The Supersingular Isogeny Diffie-Hellman protocol (SIDH) has recently been the subject of increased attention in the cryptography community. Conjecturally quantum-resistant, SIDH has the feature that ...
Albeit the primary usage of Bitcoin is to exchange currency, its blockchain and consensus mechanism can also be exploited to securely execute some forms of smart contracts. These are agreements among ...
SoK: Security Models for Pseudo-Random Number Generators
Pseudo-random number generation security models entropy
2017/3/2
Randomness plays an important role in multiple applications in cryptography. It is required in fundamental tasks such as key generation, masking and hiding values, nonces and initialization vectors ge...