搜索结果: 1-13 共查到“军事学 Understanding”相关记录13条 . 查询时间(0.046 秒)
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Physically Unclonable Function Machine Learning Modelling Attack
2019/7/15
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
Understanding Optimizations and Measuring Performances of PBKDF2
passwords PBKDF2 HMAC-SHA1
2019/2/25
Password-based Key Derivation Functions (KDFs) are used to generate secure keys of arbitrary length implemented in many security-related systems. The strength of these KDFs is the ability to provide c...
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Authenticated Key Exchange CK Model Key Encapsulation Mechanism
2018/11/19
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM)....
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Anonymity Differential Privacy
2017/9/18
Differential privacy, and close other notions such as dχdχ-privacy, is at the heart of the privacy framework when considering the use of randomization to ensure data privacy. Such a guarantee is alway...
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups
secure messaging group communication confidentiality
2017/8/21
Secure messaging systems such as TextSecure and Signal aim, among others, at providing authenticated and confidential channels between two or more communicating users. The general understanding seems ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers con...
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
lightweight cryptography finite field multiplication basis of finite field
2016/5/3
In this paper, we study the behavior of the XOR count distributions under different bases of finite field. XOR count of a field element is a simplified metric to estimate the hardware implementation c...
Towards a Further Understanding of Bit-Based Division Property
Integral cryptanalysis Table-aided bit-based division property Early reduce
2016/4/21
At EUROCRYPT 2015, Todo proposed the division property. Since then, many researches about the division property had occurred in succession. Inspired by the bit-based division property on SIMON introdu...
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
public key encryption puncturable key encapsulation mechanism chosen ciphertext security
2016/1/4
In this paper, we introduce and study a new cryptographic primitive that we call puncturable key encapsulation
mechanism (PKEM), which is a special class of KEMs that satisfy some functional and secu...
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
AES AES-like differential cryptanalysis
2016/1/3
Designing block ciphers and hash functions in a manner that resemble the AES in
many aspects has been very popular since Rijndael was adopted as the Advanced Encryption
Standard. However, in sharp c...
Towards Understanding the Known-Key Security of Block Ciphers
Block ciphers known-key security known-key distinguishers
2016/1/3
Known-key distinguishers for block ciphers were proposed
by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major
research topic in cryptanalysis since then. A formalization of known-key
attac...
Securing Plastic Money: Understanding the Requirements of a New Cashless Payment System
Securing Plastic Money Requirements New Cashless Payment System
2009/8/18
Since 2006, there have been three major systems that have been implemented in an attempt to reduce the
threat of credit card fraud - Chip and PIN (United Kingdom), Chip Authentication Program - CAP (...
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Phase Shifting Equivalent Keys Exhaustive Search specific ciphers
2009/6/3
Recent articles [6, 3, 5, 7] introduce the concept of phase shifting
equivalent keys in stream ciphers, and exploit this concept in order to
mount attacks on some specic ciphers. The idea behind ph...