搜索结果: 1-6 共查到“军事学 coding theory”相关记录6条 . 查询时间(0.093 秒)
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Side-channel analysis belief propagation random probing model
2018/5/28
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security...
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
A Provably Secure Short Signature Scheme from Coding Theory
code-based signatures signatures with message recovery provable security
2015/12/22
Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are useful where bandwidth is one of the crucial concern and especia...
On Constructing Homomorphic Encryption Schemes from Coding Theory
foundations Homomorphic Encryption Coding Theory Efficiency
2011/7/25
Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications.
On Constructing Homomorphic Encryption Schemes from Coding Theory
foundations / Homomorphic Encryption Coding Theory Efficiency Provable Security
2012/3/28
Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the recent decades but none of the...