搜索结果: 1-7 共查到“军队指挥学 shuffling”相关记录7条 . 查询时间(0.109 秒)
We consider the problem of designing scalable, robust protocols for computing statistics about sensitive data. Specifically, we look at how best to design differentially private protocols in a distrib...
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
oblivious shuffling data outsourcing cloud computing
2019/1/26
As data outsourcing becomes popular, oblivious algorithms have raised extensive attentions since their control flow and data access pattern appear to be independent of the input data they compute on a...
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
masking shuffling RNG
2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Lattice-Based Cryptography BLISS Side-Channel Analysis
2017/2/20
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, sh...
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
PRFs Shuffling
2016/1/9
Combining countermeasures is usually assumed to be the
best way to protect embedded devices against side-channel attacks. These
combinations are at least expected to increase the number of measureme...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a pri...
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers– Extended Version –
Higher-order Masking Software Implementations Block Ciphers
2009/9/2
Differential Power Analysis (DPA) is a powerful side channel
key recovery attack that efficiently breaks block ciphers implementations.
In software, two main techniques are usually applied to thwart...