搜索结果: 1-15 共查到“Implementing”相关记录148条 . 查询时间(0.14 秒)
Reducing the Cost of Implementing AES as a Quantum Circuit
quantum cryptanalysis quantum circuit Grover’s algorithm AES
2019/7/24
To quantify security levels in a post-quantum scenario, it is common to use the quantum resources needed to attack AES as a reference value. Specifically, in NIST’s ongoing post-quantum standardizatio...
Implementing Token-Based Obfuscation under (Ring) LWE
implementation lattice techniques token-based program obfuscation
2019/1/2
Token-based obfuscation (TBO) is an interactive approach to cryptographic program obfuscation that was proposed by Goldwasser et al. as a potentially more practical alternative to conventional non-int...
DEVELOPMENT OF A FRAMEWORK FOR IMPLEMENTING 3D SPATIAL DATA INFRASTRUCTURE IN OMAN – ISSUES AND CHALLENGES
2D and 3D Geospatial datasets 2D SDI 3D SDI
2018/11/9
The paper reviews that there are several issues and challenges in order to implement full 2D and 3D Spatial Data Infrastructure (SDI) in Oman. The state of current 2D SDI and 3D geospatial data has be...
Issues and Opportunities on Implementing an Online Faculty Review System
Issues Opportunities Implementing Online Faculty
2018/11/22
Intensifying accountability pressures have led to an increased attention to assessments of teaching, but teaching generally represents only a portion of faculty duties. Less attention has been paid to...
IMPLEMENTING GIS TO IMPROVE HOSPITAL EFFICIENCY IN NATURAL DISASTERS
Disaster management GIS Hospital Mitigation Natural disasters Preperdness
2018/4/18
Over the past decades, the number of natural disasters has been growing around the world. In addition to damaging communities and infrastructures, unexpected disasters also affect service providers su...
IMPLEMENTING GIS TO IMPROVE HOSPITAL EFFICIENCY IN NATURAL DISASTERS
Disaster management GIS Hospital Mitigation Natural disasters Preperdness
2018/5/8
Over the past decades, the number of natural disasters has been growing around the world. In addition to damaging communities and infrastructures, unexpected disasters also affect service providers su...
Implementing the Pharmacists’ Patient Care Process at a Public Pharmacy School
Pharmacists Process Public Pharmacy School
2018/11/21
The Joint Commission of Pharmacy Practitioners has provided the profession of pharmacy a patient-centered care model known as the Pharmacists’ Patient Care Process (PPCP). This process will serve to p...
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs
Post-quantum cryptography multivariate quadratic systems parallel implementation
2017/12/11
The hardness of solving multivariate quadratic (MQ) systems is the underlying problem for multivariate-based schemes in the field of post-quantum cryptography. The concrete, practical hardness of this...
Implementing Conjunction Obfuscation under Entropic Ring LWE
lattice techniques program obfuscation conjunction
2017/9/7
We address the practicality challenges of secure program obfuscation by developing, implementing and experimentally assessing an approach to securely obfuscate conjunction programs in software. Conjun...
Multivariate Public Key Cryptosystems (MPKCs) are often touted as future-proofing against Quantum Computers. In 2009, it was shown that hardware advances do not favor just ``traditional'' alternatives...
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Homomorphic Commitment non-homomorphic
2017/5/15
In this paper we present SplitCommit, a portable and efficient C++ implementation of the recent additively homomorphic commmitment scheme of Frederiksen et al. [FJNT16]. We describe numerous optimizat...
We implementated (a simplified version of) the branching-program obfuscator due to Gentry et al.\@ (GGH15), which is itself a variation of the first obfuscation candidate by Garg et al. (GGHRSW13). To...
Implementing and Proving the TLS 1.3 Record Layer
implementation provable security transport layer security
2017/1/3
The record layer is the main bridge between TLS applications and internal sub-protocols. Its core functionality is an elaborate authenticated encryption: streams of messages for each sub-protocol (han...
Implementing Complete Formulas on Weierstrass Curves in Hardware
Elliptic curve cryptography FPGA Weierstrass curves
2016/12/12
This work revisits the recent complete addition formulas for prime order elliptic curves of Renes, Costello and Batina in light of parallelization. We introduce the first hardware implementation of th...
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller
Algebraic eraser group theoretic cryptography braid groups
2016/12/7
Recently a novel family of braid based cryptographic hash function candidates was published,
claiming to be suitable for use in low resource environments. It was shown that the new hash
function fam...