搜索结果: 1-8 共查到“知识库 Cryptology”相关记录8条 . 查询时间(0.085 秒)
Cryptology ePrint Archive: Report 2013/112
Physical Unclonable Functions Machine Learning Cryptanalysis Physical Cryptography
2013/4/18
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a Strong PUF, our ...
Cryptology ePrint Archive: Report 2011/099Can Code Polymorphism Limit Information Leakage?
cryptographic protocols / side channels polymorphism
2011/3/10
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not i...
New Magic Square Problems and Their Applications in Cryptology
magic square unfinished magic square modular arithmetic shuffling permutation authentication
2010/12/22
Magic square is a complex and hard permutation problem of combinatorial mathematics with a long history, previous research work primarily focuses on how to construct some magic squares with special ma...
Artificial neural network based chaotic generator for cryptology
Artificial neural network chaos cryptology
2010/10/12
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems i...
Artificial neural network based chaotic generator for cryptology
Artificial neural network chaos cryptology
2010/3/17
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems i...
New logic minimization techniques with applications to cryptology
AES S-box finite field inversion circuit complexity
2009/6/12
A new technique for combinational circuit optimization is described in the
context of S-boxes. The technique is a two-step process. In the first step, the
non-linearity of the circuit { as measured ...
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Cryptology and Physical Security Rights Amplification Master-Keyed Mechanical Locks
2009/4/15
This paper examines mechanical lock security from the perspective of computer science and cryptology.
We focus on new and practical attacks for amplifying rights in mechanical pin tumbler locks. Give...
THE BEST AND WORST OF SUPERSINGULAR ABELIAN VARIETIES IN CRYPTOLOGY
abelian varieties supersingular elliptic curves
2009/4/13
For certain security applications, including identity based encryption
and short signature schemes, it is useful to have abelian varieties with security
parameters that are neither too small nor too...