搜索结果: 1-15 共查到“知识库 军事学 Structures”相关记录57条 . 查询时间(0.18 秒)
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
KECCAK SHA-3 Hash function
2019/8/2
In this paper, we present new preimage attacks on KECCAK-384 and KECCAK-512 for 2, 3 and 4 rounds. The attacks are based on non-linear structures (structures that contain quadratic terms). These struc...
Continuously Non-Malleable Secret Sharing for General Access Structures
Secret sharing Non-malleability Leakage resilience
2019/6/3
We study leakage-resilient continuously non-malleable secret sharing, as recently intro- duced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can continuously tamper and leak from a...
We study approaches to generalized Feistel constructions with low-degree round functions with a focus on x → x^3. Besides known constructions, we also provide a new balanced Feistel construction...
Uncovering Algebraic Structures in the MPC Landscape
MPC Landscape Commuting Permutations Systems
2019/3/13
A fundamental problem in the theory of secure multi-party computation (MPC) is to characterize functions with more than 2 parties which admit MPC protocols with information-theoretic security against ...
Secret-Sharing Schemes for General and Uniform Access Structures
secret sharing conditional disclosure of secrets protocols private simultaneous messages protocols
2019/3/4
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the collection of authorized sets is called the access structure. For over 30 years, it was known that any (mono...
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Non-malleable secret sharing Leakage-resilient secret sharing Non-malleable extractors
2018/12/3
In this work we present a collection of compilers that take secret sharing schemes for an arbitrary access structures as input and produce either leakage-resilient or non-malleable secret sharing sche...
Construction of Lightweight MDS Matrices from Generalized Feistel Structures
Lightweight cryptography MDS matrix Generalized Feistel Structures
2018/11/12
This paper investigates the construction of lightweight MDS matrices with generalized Feistel structures (GFS). The approach developed by this paper consists in deriving MDS matrices from the product ...
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
cryptographic protocols secret sharing
2018/11/8
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. Th...
Non-Malleable Secret Sharing for General Access Structures
Non-Malleable Codes Secret Sharing
2018/8/20
Goyal and Kumar (STOC'18) recently introduced the notion of non-malleable secret sharing. Very roughly, the guarantee they seek is the following: the adversary may potentially tamper with all of the s...
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
MILP Generalized Feistel structure Switching mechanism
2018/8/16
Some features of Feistel structures have caused them to be considered as an efficient structure for design of block ciphers. Although several structures are proposed relied on Feistel structure, the t...
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants
Secret sharing Optimal information ratio Decomposition techniques
2017/12/25
We review the problem of finding the optimal information ratios of graph access structures on six participants. Study of such access structures were initiated by van Dijk [Des. Codes Cryptogr. 15 (199...
Efficient Oblivious Data Structures for Database Services on the Cloud
Privacy-enhancing Technologies Oblivious Data Structure ORAM
2017/12/25
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing encryption techniq...
Quantum Key-recovery Attack on Feistel Structures
Quantum-CPA Key-recovery Attack Feistel Structure
2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...
Improvements for Finding Impossible Differentials of Block Cipher Structures
block cipher cryptanalysis impossible differential
2017/12/19
In this paper we improve Wu and Wang's method for finding impossible differentials of block cipher structures. This improvement is more general than Wu and Wang's method that it can find more impossib...
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Secret-sharing share size monotone span program
2017/9/28
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G=(V,E)G=(V,E) if a pair of vertices can reconstruct the secret if and only if it is an edge in GG. Secret-s...