搜索结果: 1-15 共查到“密码学 framework”相关记录136条 . 查询时间(0.154 秒)
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
UC commitment smooth projective hash function SPHF
2019/9/23
Hash proof systems or smooth projective hash functions (SPHFs) have been proposed by Cramer and Shoup (Eurocrypt'02) and can be seen as special type of zero-knowledge proof system for a language. Whil...
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Privacy-Preserving Machine Learning Deep Learning Graph Compilers
2019/8/21
In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that en- ables data scientists to deploy models with popular frameworks such as Tens...
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
EMV Universal Composability Security Models
2019/8/19
EMV, also known as Chip and PIN, is the world-wide standard for card-based electronic payment. Its security wavers: over the past years, researchers have demonstrated various practical attacks, rangin...
A Coin-Free Oracle-Based Augmented Black Box Framework
Black Box Construction Zero-Knowledge Proof NIZK
2019/7/25
After the work of Impagliazzo and Rudich (STOC, 1989), the black box framework has become one of the main research domain of cryptography. However black box techniques say nothing about non-black box ...
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Oblivious transfer universal composability key exchange
2019/6/21
Oblivious transfer is one of the main pillars of modern cryptography and plays a major role as a building block for other more complex cryptographic primitives. In this work, we present an efficient a...
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
hash function RIPEMD-160 freedom degree utilization
2019/6/10
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1. However, for RIPEMD-160, no (semi-free-start)...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
A Central Limit Framework for Ring-LWE Decryption
Ring-LWE Central Limit Theorem δ-subgaussian
2019/5/9
The purpose of this paper is to use a Central Limit approach to develop a statistical framework for analysing ciphertexts in Ring-LWE homomorphic encryption schemes. This statistical framework gives r...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
tweakable block cipher GIFT AES
2019/5/5
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) bet...
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also code-b...
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
privacy-preserving machine learning information-theoretic privacy
2019/2/26
How to train a machine learning model while keeping the data private and secure? We present CodedPrivateML, a fast and scalable approach to this critical problem. CodedPrivateML keeps both the data an...
A General Proof Framework for Recent AES Distinguishers
AES Distinguisher Subspace Trail Cryptanalysis
2019/2/26
In this paper, a new framework is developed for proving and adapting the recently proposed multiple-of-8 property and mixture-differential distinguishers. The above properties are formulated as immedi...
Profiling Side-channel Analysis in the Restricted Attacker Framework
Side-channel analysis Machine learning Deep learning
2019/2/25
Profiling side-channel attacks represent the most powerful category of side-channel attacks. There, we assume that the attacker has access to a clone device in order to profile the device. Additionall...
Privacy Computing: Concept, Computing Framework And Future Development Trends
Privacy computing privacy information description privacy metric
2018/12/3
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by the large Internet company in the process of serving...