搜索结果: 1-7 共查到“军事学 handling”相关记录7条 . 查询时间(0.044 秒)
Handling Correlated Errors: Hardness of LWE in the Exponent
Learning with errors Error-Correction Generic Group Model
2018/11/5
The hardness of decoding random linear codes with errors is a complexity-theoretic assumption with broad applications to cryptography. In contrast, Reed-Solomon codes permit efficient decoding in many...
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Human computation Key exchange One-time passwords
2017/6/9
We propose the first user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. If a user happens to log in to a server from a terminal that has been fully...
Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
Homomorphic Encryption public-key cryptography
2016/12/7
While the smart grid has the potential to have a positive impact on the sustainability and efficiency of the electricity market, it also poses some serious challenges with respect to the privacy of th...
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Authenticated encryption CAESAR Cryptographic module
2015/12/31
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working
within the constraints of a low buffer size: Releasing unverified plaintext (RUP) or Producin...
Oblivious PAKE and Efficient Handling of Password Trials
cryptographic protocols / Password Based Authenticated Key Exchange
2013/4/18
An often neglected problem for potential practical adoption of Password-based Authenticated Key Exchange (PAKE) protocols on the Internet is the handling of failed password trials. Unlike the currentl...
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
foundations / cryptanalysis implementation AES Virtualization Side Channel Attack
2012/3/27
In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly...
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
expected polynomial-time black-box simulation secure multiparty computation
2009/3/12
The standard class of adversaries considered in cryptography is that of strict polynomial-time
probabilistic machines. However, expected polynomial-time machines are often also considered.
For examp...