搜索结果: 1-8 共查到“军事学 heuristic”相关记录8条 . 查询时间(0.046 秒)
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
somewhat homomorphic encryption multiplicative depth Boolean functions
2019/8/27
In somewhat homomorphic encryption schemes (e.g. B/FV, BGV) the size of ciphertexts and the execution performance of homomorphic operations depends heavily on the multiplicative depth. The multiplicat...
A multi-start heuristic for multiplicative depth minimization of boolean circuits
boolean functions homomorphic encryption multiplicative depth
2017/6/1
In this work we propose a multi-start heuristic which aims at minimizing the multiplicative depth of boolean circuits. The multiplicative depth objective is encountered in the field of homomorphic enc...
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
fiat-shamir zero-knowledge random oracle model
2016/12/10
This paper is concerned with two variants of the transformation that appear but have not been clearly delineated in existing literature. Both variants start with the prover making a commitment. The st...
Most applicable lattice reduction algorithms used in practice are BKZ (Block-Korkine-Zolotarev) type algorithms as the blockwise generalizations of the LLL algorithm (Lenstra-Lenstra-Lovasz). Its orig...
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
linear cryptanalysis authenticated encryption automated tools
2016/1/27
Differential and linear cryptanalysis are the general purpose
tools to analyze various cryptographic primitives. Both techniques have
in common that they rely on the existence of good differential o...
THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
Cryptanalysis Stream cipher Guess Determine attack
2016/1/8
SNOW 2.0 is a word oriented stream cipher that has been selected as a standard stream cipher on ISO/IEC
18033-4. One of the general attacks on the stream ciphers is Guess and Determine attack. Heuris...
A heuristic for finding compatible differential paths with application to HAS-160
akircanski at gmail com
2014/3/12
The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this context, attacks typically proceed by starting from the middle and...
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
lattice shortest vector sieve heuristic sphere covering
2010/12/22
In this paper, we present an improvement of the Nguyen-Vidick heuristic sieve algorithm for shortest vector problem in general lattices, which time complexity is 2^{0.3836n} polynomial computations, a...