搜索结果: 1-15 共查到“知识库 Not”相关记录809条 . 查询时间(0.125 秒)
浙江大学生命科学研究院2021年3月16日范衡宇课题组在Advanced Science杂志发表论文阐明CCR4-NOT复合体中RNA识别亚基CNOT4在哺乳动物生殖细胞性染色体配对中的生理功能(图)
范衡宇 CCR4-NOT复合体 RNA识别 动物生殖细胞 性染色体配对 生理功能
2022/10/26
2021年3月16日,浙江大学生命科学研究院范衡宇课题组在Advanced Science杂志上在线发表了题为“The CNOT4 Subunit of the CCR4-NOT Complex is Involved in mRNA Degradation, Efficient DNA Damage Repair, and XY Chromosome Crossover during Male ...
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
public-key cryptography leakage-resilient identity-based encryption
2019/8/30
In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA...
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
somewhat homomorphic encryption multiplicative depth Boolean functions
2019/8/27
In somewhat homomorphic encryption schemes (e.g. B/FV, BGV) the size of ciphertexts and the execution performance of homomorphic operations depends heavily on the multiplicative depth. The multiplicat...
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
ZK contingent payments Bitcoin zkSNARKs
2019/8/27
While fair exchange of goods is known to be impossible without assuming a trusted party, smart contracts in cryptocurrencies forgo such parties by assuming trust in the currency system. They allow a s...
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Zero-Leakage Information Hiding Winnowing
2019/5/27
How much we say, to whom, and when, is inherently telling, even if the contents of our communication is unclear. In other words: encryption is not enough; neither to secure privacy, nor to maintain co...
How to not break SIDH
isogenies SIDH cryptanalysis
2019/5/27
We give a number of approaches which, to a newcomer, may seem like natural ways to attack the SIDH/SIKE protocol, and explain why each of these approaches seems to fail, at least with the specific set...
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Encrypted computing Compilers Obfuscation
2019/4/28
An `obfuscation' for the encrypted computing context is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data, with or without e...
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
fault countermeasure infection differential fault analysis
2019/4/8
As fault based cryptanalysis is becoming more and more of a practical threat, it is imperative to make efforts to devise suitable countermeasures. In this regard, the so-called ``infective countermeas...
Very recently, a preprint ``Cryptanalysis of the Wave Signature Scheme'', eprint 2018/1111, appeared claiming to break Wave ``Wave: A New Code-Based Signature Scheme'', eprint 2018/996. We explain her...
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
ARM compute cluster cyptanalysis
2018/11/9
Servers with many cores cost a lot of money and consume large amounts of energy. The developments in hardware for mobile devices has resulted in a surge in relatively cheap, powerful, and low-energy C...
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
message franking commitment encryption
2018/11/5
Message franking enables a receiver to report a potential abuse in a secure messaging system which employs an end to end encryption. Such mechanism is crucial for accountability and is already widely ...
Illuminating the Dark or how to recover what should not be seen
Functional encryption Information leakage Private classification
2018/11/5
Functional encryption (FE) is a cryptographic primitive which allows to partially decrypt ciphertexts, e.g. evaluate a function over encrypted inputs and obtain the output in clear. The downside of em...
"S-Box" Implementation of AES is NOT side-channel resistant
AES Side- channel Cache Lookup table
2018/11/5
Several successful cache-based attacks have provided strong impetus for developing side channel resistant software implementations of AES. One of the best-known countermeasures - use of a "minimalist"...
BISON - Instantiating the Whitened Swap-Or-Not Construction
Block Ciphers Differential Cryptanalysis Whitened Swap-Or-Not
2018/11/2
We give the first practical instance – BISON – of the Whitened Swap-Or-Not construction. After clarifying inherent limitations of the construction, we point out that this way of building block ciphers...
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
electrtonic voting human factors in security verifiability
2018/7/18
A well-known issue in electronic voting is the risk of manipulation of the cast vote. For countering this risk, a number of methods have been proposed that enable the voter to verify that their cast v...