搜索结果: 1-5 共查到“军事学 Automated analysis”相关记录5条 . 查询时间(0.156 秒)
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
signature schemes symbolic models formal methods
2019/7/10
The standard definition of security for digital signatures---existential unforgeability---does not ensure certain properties that protocol designers might expect. For example, in many modern signature...
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
whitebox cryptanalysis security evaluation
2018/1/29
Differential computation analysis (DCA) is a technique recently introduced by Bos et al. and Sanfelix et al. for key recovery from whitebox implementations of symmetric ciphers. It consists in applyin...
Automated Analysis of Cryptographic Assumptions in Generic Group Models
generic group model multilinear maps graded encoding schemes
2016/1/9
We initiate the study of principled, automated, methods for
analyzing hardness assumptions in generic group models, following the
approach of symbolic cryptography. We start by defining a broad clas...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
modes of operation synthesis
2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks.
Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
Automated Analysis and Synthesis of Authenticated Encryption Schemes
secret-key cryptography authenticated encryption synthesis
2015/12/29
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions
of confidentiality and integrity. Although various AE schemes are known, there remains significant
...