搜索结果: 1-10 共查到“军事学 Most Sensitive”相关记录10条 . 查询时间(0.023 秒)
Public Ledger for Sensitive Data
Privacy-Preserving Ledger Blockchain End to End Encryption
2019/6/19
In this work an original protocol is presented that allows sensitive data to be stored on a ledger where its integrity may be publicly verified, but its privacy is preserved and owners can tightly man...
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication
Secure sketches typo-tolerant password authentication
2017/6/9
Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We re...
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
lattices shortest vector problem (SVP) sieving algorithms
2016/1/7
By replacing the brute-force list search in sieving algorithms with Charikar's angular locality-sensitive hashing (LSH) method, we get both theoretical and practical speedups for solving the shortest ...
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
shortest vector problem (SVP), sieving algorithms, nearest neighbor problem
2016/1/3
Recently, it was shown that angular locality-sensitive hashing (LSH) can be used to significantly speed up lattice sieving, leading to a heuristic time complexity for solving the shortest vector probl...
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
leakage resilient cryptography bounded retrieval model key derivation
2016/1/3
In this paper we address the problem of large space consumption
for protocols in the Bounded Retrieval Model (BRM), which require users to
store large secret keys subject to adversarial leakage. We ...
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
cryptographic protocols security analysis of protocols
2014/3/7
The anonymous communication protocol Tor constitutes the most widely deployed technology for providing anonymity for user communication over the Internet. Several frameworks have been proposed that sh...
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
cryptographic protocols
2012/3/29
The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. We conside...
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
University of California Irvine
2011/3/11
The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic
everyday scenarios, ranging from national security to social networking. We consid...
Privacy-Preserving Sharing of Sensitive Information is (Really) Practical
Privacy-Preserving Sensitive Information
2010/9/9
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social networks). A typical scen...
Block ciphers sensitive to Gr¨obner Basis Attacks
secret–key cryptography cryptanalysis block ciphers algebraic attacks
2009/2/16
We construct and analyze Feistel and SPN ciphers that have a sound design strategy against linear and
differential attacks but for which the encryption process can be described by very simple polynom...