搜索结果: 1-7 共查到“军事学 context”相关记录7条 . 查询时间(0.132 秒)
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Key-reuse APIs Diffie-Hellman EdDSA
2019/5/21
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Delegated Computation Homomorphic Authenticators Context Hiding
2018/6/27
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When sensitive data is involve...
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
mesh network IEEE 802.15.4 AES-CCM
2018/1/19
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional netwo...
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions
Indifferentiability UCE hash functions
2017/5/27
Understanding how hash functions can be used in a sound manner within cryptographic protocols, as well as how they can be constructed in a sound manner from compression functions, are two important pr...
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
side channel evaluations key rank
2016/5/23
Quantifying the side channel security of implementations has been a significant research question for several years in academia but also among real world side channel practitioners. As part of securit...
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
lightweight cryptography finite field multiplication basis of finite field
2016/5/3
In this paper, we study the behavior of the XOR count distributions under different bases of finite field. XOR count of a field element is a simplified metric to estimate the hardware implementation c...
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
recommender systems homomorphic encryption key recovery attacks
2015/12/31
Nowadays, recommender systems have become an indispensable part of our
daily life and provide personalized services for almost everything. However, nothing is
for free – such systems have also upset...