搜索结果: 1-11 共查到“军事学 Language”相关记录11条 . 查询时间(0.062 秒)
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
NIZK USS-NIZK black-box construction
2019/6/13
Highly efficient non-interactive zero-knowledge arguments (NIZK) are often constructed for limited languages and it is not known how to extend them to cover wider classes of languages in general. In t...
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
public ledgers formal verification proverif
2018/5/11
Cryptocurrencies have popularized public ledgers, known colloquially as "blockchains". While the Bitcoin blockchain is relatively simple to reason about as, effectively, a hash chain, more complex pub...
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
implementation hardware security verification
2017/3/6
Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. ...
Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014), is an encryption paradigm designed to produce ciphertexts yielding plausible-looking but bogus plaintexts upon decryption wi...
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
Cryptography encryption MSP430
2015/12/24
The encryption mode of the Tweakable Block Cipher (TBC) of the SCREAM Authenticated Cipher is implemented in the MSP430 microcontroller. Assembly language versions of the TBC are prepared using both p...
Cracking-Resistant Password Vaults using Natural Language Encoders
Honey Encryption Password Password vault
2015/12/24
Password vaults are increasingly popular applications that store multiple passwords encrypted under a single master password that the user memorizes. A password vault can greatly reduce the burden on ...
Obliv-C: A Language for Extensible Data-Oblivious Computation
Extensible Data-Oblivious Computation
2015/12/21
Many techniques for secure or private execution depend
on executing programs in a data-oblivious way,
where the same instructions execute independent of
the private inputs which are kept in encrypt...
Enforcing Language Semantics Using Proof-Carrying Data
computationally-sound proofs programming language security
2014/3/10
Sound reasoning about the behavior of programs relies on program execution adhering to the language semantics. However, in a distributed computation, when a value is sent from one party to another, th...
A Domain-Specific Language for Computing on Encrypted Data
applications / Domain-Specific Language Secret Sharing Homomorphic Encryption
2012/3/23
In cloud computing, a client may request computation on confidential data that is sent to untrusted servers. While homomorphic encryption and secure multiparty computation provide building blocks for ...
L1 - A Programming Language for Mixed-Protocol Secure Computation
secure computation compiler framework implementation performance homomorphic encryption yao garbled circuits
2010/11/16
Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several general protocols for S...
First Steps Toward a Cryptography-Aware Language and Compiler
Cryptography-Aware Language Compiler cryptography-aware domain-specific language
2009/2/9
When developing secure, high-performance cryptographic software,
the programmer is presented with a wide range of problems. Not
only must they be conversant with pertinent scientic results, they mu...