搜索结果: 1-7 共查到“军队指挥学 After-the-Fact”相关记录7条 . 查询时间(0.062 秒)
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
After-the-Fact leakage bounded memory leakage split-state
2017/5/25
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these a...
Modelling After-the-fact Leakage for Key Exchange
key exchange protocols public-key side-channel attacks
2016/1/25
Security models for two-party authenticated key exchange (AKE) protocols have developed over time
to prove the security of AKE protocols even when the adversary learns certain secret values. In this ...
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
leakage resilience key exchange continuous leakage
2016/1/23
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the ...
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Leakage-resilient cryptography Cryptographic protocols Key exchange
2016/1/5
Side-channel attacks are severe type of attack against implementation of cryptographic
primitives. Leakage-resilient cryptography is a new theoretical approach to formally address
the problem of sid...
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
key exchange protocols side-channel attacks leakage-resilience
2015/12/31
Security models for two-party authenticated key exchange (AKE) protocols have developed over
time to capture the security of AKE protocols even when the adversary learns certain secret values.
Incre...
After-the-Fact Leakage in Public-Key Encryption
Leakage-resilient cryptography Public-key encryption
2011/1/12
What does it mean for an encryption scheme to be leakage-resilient Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but only considered leakage t...
After-the-Fact Leakage in Public-Key Encryption
foundations / Leakage-resilient cryptography Public-key encryption
2012/3/30
What does it mean for an encryption scheme to be leakage-resilient Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but only considered leakage t...