搜索结果: 1-11 共查到“军事学 Parameter”相关记录11条 . 查询时间(0.164 秒)
We examine the current parameter choice of Round5, and rectify its consideration of the improved dual attack due to Albrecht [Albrecht-EC17]: there is one significant optimization of Albrecht's dual a...
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Primality testing Miller-Rabin test Diffie-Hellman
2019/1/18
We consider the problem of constructing Diffie-Hellman (DH) parameters which pass standard approaches to parameter validation but for which the Discrete Logarithm Problem (DLP) is relatively easy to s...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Public-key encryption subversion mass surveillance
2018/1/11
We initiate the study of public-key encryption (PKE) schemes and key-encapsulation mechanisms (KEMs) that retain security even when public parameters (primes, curves) they use may be untrusted and sub...
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
learning with errors cryptanalysis homomorphic encryption
2017/2/20
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE. A...
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Parameter Subversion CRS
2016/4/15
Motivated by the subversion of ``trusted'' public parameters in mass-surveillance activities, this paper studies the security of NIZKs in the presence of a maliciously chosen common reference string. ...
Attacks and parameter choices in HIMMO
Key predistribution scheme collusion attack identity lattice analysis
2016/2/23
The HIMMO scheme has been introduced as a lightweight
collusion-resistant key pre-distribution scheme, with excellent efficiency
in terms of bandwidth, energy consumption and computation time. As it...
Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures
Modified Parameter Attacks Practical Attacks CCA2 Secure Cryptosystems Countermeasures
2009/4/3
We introduce the concept of Modi¯ed Parameter Attacks, a
natural extension of the idea of Adapative Chosen Ciphertext Attacks
(CCA2) under which some CCA2 secure systems can be shown to be
ins...
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
Polynomial-Reconstruction Public-Key System Optimal Parameter Choice
2009/3/27
Recently, Augot and Finiasz presented a coding theoretic public key cryptosystem that
suggests a new approach for designing such systems based on the Polynomial Reconstruc-
tion Problem. Their crypt...
Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
Baseline Parameter Generation Algorithm NTRUSign
2009/2/25
The NTRUSign signature scheme was introduced in [8]. The original presentation gave a theoretical
description of the scheme and an analysis of its security, along with several parameter choices which...
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
Parameter Sets NTRUEncrypt NAEP SVES-3
2009/1/15
We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security.