搜索结果: 1-4 共查到“军队指挥学 Key-reuse”相关记录4条 . 查询时间(0.078 秒)
In 1998, Jerey Hostein, Jill Pipher, and Joseph H. Silverman introduced the famous Ntru cryptosystem, and called it "A ring-based public key cryptosystem". Actually it turns out to be a lattice based ...
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Key-reuse APIs Diffie-Hellman EdDSA
2019/5/21
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
LWE RLWE KEM
2019/3/13
In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a K...
Assessment of the Key-Reuse Resilience of NewHope
Post-quantum cryptography lattice based cryptography active attack
2019/1/26
NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. In this p...