搜索结果: 1-14 共查到“军事学 Approaches”相关记录14条 . 查询时间(0.062 秒)
New Approaches to Traitor Tracing with Embedded Identities
traitor tracing public-key cryptography
2019/8/30
In a traitor tracing (TT) system for nn users, every user has his/her own secret key. Content providers can encrypt messages using a public key, and each user can decrypt the ciphertext using his/her ...
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Hardness Amplification Complexity Theory FPGA Security
2019/5/23
The era of PUFs has been characterized by the efforts put into research and the development of PUFs that are robust against attacks, in particular, machine learning (ML) attacks. In the lack of system...
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication
Secure sketches typo-tolerant password authentication
2017/6/9
Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We re...
Model-counting Approaches For Nonlinear Numerical Constraints
Side-channel Attacks Modulo Exponentiation Quantitative Information Flow
2017/3/21
Model counting is of central importance in quantitative reasoning about systems. Examples include computing the probability that a system successfully accomplishes its task without errors, and measuri...
Survey of Approaches for Security Verification of Hardware/Software Systems
formal methods theorem provers model checkers
2016/12/10
Variety of computing systems have been proposed to provide protection for sensitive code or data through hardware or software mechanisms. This paper surveys the landscape of security verification appr...
The public health implications of the Dietary Approaches to Stop Hypertension Trial
public health Dietary Approaches
2016/6/14
The Dietary Approaches to Stop Hypertension (DASH) Trial
was designed to assess the relation between modification of
dietary patterns and hypertension (1, 2). DASH provides evidence
that existing d...
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
secure outsourcing algorithm modular exponentiations one-malicious model
2016/1/27
Outsourcing paradigm is one of the most attractive benefits of cloud computing,
where computation workloads can be outsourced to cloud servers by the resourceconstrained
devices, such as RFID tags. ...
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
AES side channel attacks simple power analysis
2016/1/25
Simple side-channel attacks trade off data complexity (i.e.
the number of side-channel observations needed for a successful attack)
with computational complexity (i.e. the number of operations appli...
Performance Increasing Approaches For Binary Field Inversion
binary field multiplicative inversion Extended Euclidean Algorithm
2016/1/8
Authors propose several approaches for increasing performance of multiplicative inversion algorithm in binary fields based on Extended Euclidean Algorithm (EEA). First approach is based on Extended Eu...
Practical approaches to varying network size in combinatorial key predistribution schemes
combinatorial cryptography key distribution
2014/3/10
Combinatorial key predistribution schemes can provide a practical solution to the problem of distributing symmetric keys to the nodes of a wireless sensor network. Such schemes often inherently suit n...
New Approaches to Password Authenticated Key Exchange based on RSA
password authentication off-line dictionary attack
2009/3/23
We investigate eÆcient protocols for password-authenticated key exchange based on the RSA
public-key cryptosystem. To date, most of the published protocols for password-authenticated
key excha...
Approaches to Transparency in Arms Control and Verification - A Canadian View of Chinese Perspectives
Transparency Arms Control and Verification Canadian View of Chinese Perspectives
2009/3/12
China and Canada represent nearly two opposite ends of a continuum
starting with near-total secrecy and ending at near-total transparency in matters of state. Canada advocates transparency, and Chin...
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver,
in a way that the Receiver cannot convince a third party that such authentication (or any
authentication) e...