搜索结果: 1-9 共查到“军事学 Platforms”相关记录9条 . 查询时间(0.046 秒)
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Multivariate Cryptography Noncommutative Cryptography stable transformation groups and semigroups
2019/8/6
Non-commutative cryptography studies cryptographic primitives and systems which are based on algebraic structures like groups, semigroups and noncommutative rings. We con-tinue to investigate inverse ...
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Compromised Platforms control systems
2019/7/31
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
lightweight cryptography block cipher design bit-slice
2016/1/26
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main
idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice
techniques. RECTAN...
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Publish-Subscribe BP-ABE Subscription Policy
2016/1/5
Data publish-subscribe service is an effective approach to share and filter data. Due to the huge volume and velocity of data generated daily, cloud systems are inevitably becoming the platform for da...
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Precomputation Post-Quantum Signatures Hash-based Signatures
2015/12/31
Precomputation techniques are useful to improve realtime
performance of complex algorithms at the expense of extra
memory, and extra preparatory computations. This practice is neglected
especially ...
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Branch misprediction HPC public-key cipher, side-channel
2015/12/29
Asymmetric-key cryptographic algorithms when implemented on systems with branch predictors, are subjected to side-channel attacks exploiting the deterministic branch predictor behavior due to their ke...
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
Scalar Conversion Lazy Reduction
2014/3/10
Koblitz curves are a class of computationally efficient elliptic curves where scalar multiplications can be accelerated using $\tau$NAF representations of scalars. However conversion from an integer s...
This paper presents new software speed records for encryp-
tion and decryption using the block cipher AES-128 for dierent ar-
chitectures. Target platforms are 8-bit AVR microcontrollers, NVIDIA
g...
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
Ultra Fast Public Key Cryptosystems Multivariate Quadratic Quasigroup MQQ
2009/6/5
We have implemented in FPGA recently published class of public key algorithms MQQ, that are based on quasigroup string transformations. Our implementation achieves decryption
throughput of 399 Mbps o...