搜索结果: 1-15 共查到“军队指挥学 order”相关记录170条 . 查询时间(0.676 秒)
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
byzantine cryptocurrency bitcoin
2019/7/15
A framework for asynchronous, signature free, fully local and probabilistically converging total order algorithms is developed, that may survive in high entropy, unstructured Peer-to-Peer networks wit...
The Notion of Transparency Order, Revisited
Transparency order Differential power analysis S-box
2019/6/12
We revisit the definition of Transparency Order (TO) and that of Modified Transparency Order (MTO) as well, which were proposed to measure the resistance of an S-box against Differential Power Analysi...
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
formal verification symbolic model tamarin prover
2019/5/21
Diffie-Hellman groups are a widely used component in cryptographic protocols in which a shared secret is needed. These protocols are typically proven to be secure under the assumption they are impleme...
Second-order analyses have shown a great interest to defeat first level of masking protections. Their practical realization remains tedious in a lot of cases. This is partly due to the difficulties of...
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
Higher-Order DCA against Standard Side-Channel Countermeasures
White-box DCA Higher-order DCA
2018/11/13
At CHES 2016, Bos et al.et al. introduced differential computational analysisdifferential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack ...
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
side-channel analysis Threshold Implementation AES
2018/11/12
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols
ORE OPE searchable encryption
2018/11/6
Database query evaluation over encrypted data has received a lot of attention recently. Order Preserving Encryption (OPE) and Order Revealing Encryption (ORE) are two important encryption schemes that...
Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields
finite fields inversion multiplication
2018/11/5
Efficient scalar multiplication algorithms require a single finite field inversion at the end to convert from projective to affine coordinates. This inversion consumes a significant proportion of the ...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
An argument of knowledge allows a prover to convince a verifier of the validity of certain statements. We construct succinct arguments of knowledge with an optimal communication complexity of O(λ) bit...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Encrypting plaintexts CRYPTO
2018/6/5
Order-preserving encryption emerged as a key ingredient underlying the security of practical database management systems. Boldyreva et al. (EUROCRYPT '09) initiated the study of its security by introd...