搜索结果: 1-8 共查到“军事学 COMPETITION”相关记录8条 . 查询时间(0.035 秒)
Machine learning and side channel analysis in a CTF competition
key recovery deep learning machine learning
2019/7/25
Machine learning is nowadays supplanting or extending human expertise in many domains ranging from board games to text translation. Correspondingly, the use of such tools is also on the rise in comput...
Secure top most significant genome variants search: iDASH 2017 competition
genome variants search private genomic data IDASH competition
2018/4/4
One of the 3 tracks of iDASH Privacy & Security Workshop 2017 competition was to execute a whole genome variants search on private genomic data. Particularly, the search application was to find the to...
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
SAT solvers SAT-based cryptanalysis logic cryptanalysis
2016/12/7
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, Ketje
Jr, ICEPOLE-128a, MORUS, and NORX-32) from the CAESAR competition. We
aim at state recovery attacks using a SAT solver a...
Open Sesame: The Password Hashing Competition and Argon2
Password Hashing Competition Argon2 Memory-Hard Hash Functions
2016/2/23
In this document we present an overview of the background to and
goals of the Password Hashing Competition (PHC) as well as the design of its
winner, Argon2, and its security requirements and proper...
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition
authenticated encryption CAESAR competition symmetric cryptography
2016/1/6
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer
advantages over AES-GCM and are suitable for widespread adoption. At the moment, 48 remaining first-round
s...
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Password Hashing Competition Overview Garbage-Collector Attacks
2016/1/6
In this work we provide an overview of the candidates of
the Password Hashing Competition (PHC) regarding to their functionality,
e.g., client-independent update and server relief, their security, e...
For optimal speed, please run our manually optimized
code. Our compiler-generated code results in 1% to 2% larger circuit sizes than the manually
optimized code. The difference in actual running tim...
Password hashing is the common approach for maintaining
users’ password-related information that is later used for authentication.
A hash for each password is calculated and maintained at the servic...