搜索结果: 1-13 共查到“军事学 Same value”相关记录13条 . 查询时间(0.203 秒)
On the alpha value of polynomials in the tower number field sieve algorithm
number field sieve discrete logarithm pairing-friendly curve
2019/8/2
In this paper, we provide a notable step towards filling the gap between theory (estimates of running-time) and practice (a discrete logarithm record computation) for the Tower Number Field Sieve (TNF...
A Chosen Random Value Attack on WPA3 SAE authentication protocol
SAE WPA3 Dragonfly key exchange
2019/7/15
SAE (Simultaneous Authentication of Equals), is a password authenticated key exchange protocol, which is designed to replace the WPA2-PSK based authentication. The SAE Authentication Protocol supports...
New techniques for multi-value homomorphic evaluation and applications
lwe-based FHE multi-value bootstrapping homomorphic LUT
2018/6/25
In this paper, we propose a new technique to perform several homomorphic operations in one bootstrapping call over a multi-value plaintext space. Our construction relies on the FHEW-based gate bootstr...
VeritasDB: High Throughput Key-Value Store with Integrity
key-value store guarantees data integrity
2018/3/8
While businesses shift their databases to the cloud, they continue to depend on them to operate correctly. Alarmingly, cloud services constantly face threats from exploits in the privileged computing ...
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
ANSI X9.24-1:2009 key check value ISO/IEC 9797-1:2011
2016/1/25
ANSI X9.24-1:2009 specifies the key check value, which is used to verify the integrity
of the blockcipher key. This value is defined as the most significant bits of the ciphertext of the zero
block,...
Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Bent function hyper-bent function Dillon exponents
2016/1/8
Hyper-bent functions as a subclass of bent functions attract much
interest and it is elusive to completely characterize hyper-bent functions. Most
of known hyper-bent functions are Boolean functions...
Same Value Analysis on Edwards Curves
Elliptic curve cryptography Side-channel attack Same value
2015/12/24
In this paper, we analyze the existence of special points whose use in
SCA is known as Same Value Analysis (SVA), for Edwards curves. These
special points show up as internal collisions under power ...
An Attack Against Fixed Value Discrete Logarithm Representations
cryptographic protocols / attribute-based credentials revocation cryptanalysi discrete logarithm representation
2013/4/18
Attribute-based credentials (ABCs) are an important building block of privacy-enhancing identity management. Since non-identifying attributes can easily be abused as the anonymity they provide hides t...
The Value $4$ of Binary Kloosterman Sums
foundations Kloosterman sums elliptic curves Boolean functions Walsh-Hadamard transform
2011/7/25
Kloosterman sums have recently become the focus of much research, most notably due to their applications in cryptography and their relations to coding theory.
The Value $4$ of Binary Kloosterman Sums
foundations / Kloosterman sums elliptic curves Boolean functions Walsh-Hadamard transform bent functions
2012/3/27
Kloosterman sums have recently become the focus of much research, most notably due to their applications in cryptography and their relations to coding theory.
Very recently Mesnager has showed that ...
R. Feng, and H. Wu recently established a certain mean-value formula
for the x-coordinates of the n-division points on an elliptic curve given in
Weierstrass form (A mean value formula for elliptic ...
A mean value formula for elliptic curves
elliptic curves point multiplication division polynomial
2009/12/29
It is proved in this paper that for any point on an elliptic curve,
the mean value of x-coordinates of its n-division points is the same as
its x-coordinate.
Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
Time-Memory-Data Tradeoff attacks Stream ciphers IV initialization
2009/6/5
Time-Memory Tradeoff (TMTO) attacks on stream ciphers
are a serious security threat and the resistance to this class of attacks is
an important criterion in the design of a modern stream cipher. TMT...