搜索结果: 1-15 共查到“Block”相关记录529条 . 查询时间(0.089 秒)
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule
Key Recovery Rectangle Attack SKINNY
2019/6/19
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Current blockchains are restricted by the low throughput. Aimed at this problem, we propose Txilm, a protocol that compresses the size of transaction presentation in each block and thus saves the band...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Leakage-resilience authenticated encryption leveled implementation
2019/5/9
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
tweakable block cipher GIFT AES
2019/5/5
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) bet...
对比分析MS BLOCK T1rho、MS HS8 T1rho及3D BLOCK T1rho序列肝脏MR图像质量及T1rho值。方法 分别采用MS BLOCK T1rho(n=33)、MS HS8 T1rho(n=34)及3D BLOCK T1rho(n=22)序列对40名成年健康志愿者行腹部MR扫描,比较3种序列肝脏图像质量及T1rho值,以Pearson相关分析观察3种序列T1rho值的相关性...
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Symmetric-key cryptography tweakable block ciphers zero-correlation
2019/3/1
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
CRAFT block cipher tweakable
2019/2/28
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
探讨生长发育高峰期患者功能矫治后上颌切牙位移及牙槽骨改建情况。方法:选择使用高位头帽肌激动器(HGAC)和Twin-block功能矫治器矫治成功的30例骨性Ⅱ类下颌骨后缩患者为研究对象,根据使用矫治器的不同将其分为HGAC组和Twin-block组,每组15例患者。治疗前及治疗后分别拍摄锥形束CT(CBCT),观察上颌中切牙在牙槽骨内的相对位置变化及牙槽骨改建情况。采用SPSS 20.0 软件包对...
肺癌螺旋断层放疗计划设计中应用Block减少肺低剂量区的研究
非小细胞肺癌 螺旋断层放射治疗 低剂量区 放射剂量
2020/6/12
研究非小细胞肺癌螺旋断层放疗计划设计中应用Block降低肺低剂量区的方法。 方法:选取20例非小细胞肺癌病例,对每例病例勾画保护区域作为Block,并按以下3种不同的Block设置方式设计放疗计划。第I组采用Unblock方式,第II组采用Directional Block方式,第III组采用Complete Block+Directional Block方式。优化结果满足靶区和危及器官剂量限值后...
Block-Anti-Circulant Unbalanced Oil and Vinegar
multivariate quadratic post-quantum unbalanced oil and vinegar
2019/1/26
We introduce a new technique for compressing the public keys of the UOV signature scheme that makes use of block-anti-circulant matrices. These matrices admit a compact representation as for every blo...
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Oblivious RAM Multi-Server Setting Secure Computation
2019/1/26
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM,...