搜索结果: 1-15 共查到“军事学 verification”相关记录76条 . 查询时间(0.062 秒)
Card-based Cryptography Meets Formal Verification
secure multiparty computation card-based cryptography formal verification
2019/9/17
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation (MPC) with just a deck of cards. For the sake of simplicity, this is often done using ca...
Formal Verification of a Constant-Time Preserving C Compiler
Compilation Formal verification Constant-time security
2019/8/19
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not pe...
QAP-based Simulation-Extractable SNARK with a Single Verification
SNARK non-interactive zero-knowledge proof simulation-extractability
2019/5/31
The pairing-based simulation-extractable succinct non-interactive arguments of knowledge (SE-SNARKs) are attractive since they enable a prover to generate a proof with the knowledge of the witness to ...
Verification of Authenticated Firmware Load
formal methods formal verification model checking
2019/5/28
An important primitive in ensuring security of modern systems-on-chip designs are protocols for authenticated firmware load. These loaders read a firmware binary image from an untrusted input device, ...
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Contingent payments on a public ledger: models and reductions for automated verification
fair exchange security models blockchain
2019/5/9
We study protocols that rely on a public ledger infrastructure, concentrating on protocols for zero-knowledge contingent payment, whose security properties combine diverse notions of fairness and priv...
Decentralised ledgers are a prime application case for consensus protocols. Changing sets of validators have to agree on a set of transactions in an asynchronous network and in the presence of Byzanti...
Non-Interactive Keyed-Verification Anonymous Credentials
Anonymous credentials keyed-verification anonymous credentials non-interactive anonymous credentials
2019/2/27
Anonymous credential (AC) schemes are protocols which allow for authentication of authorized users without compromising their privacy. Of particular interest are non-interactive anonymous credential (...
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
SGX TOFU
2018/11/9
Intel's Software Guard Extensions (SGX) enables isolated execution environments, called enclaves, on untrusted operating systems (OS), and thus it can improve the security for various applications and...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
formal verification noise protocol framework cryptographic protocols
2018/8/21
The Noise Protocol Framework, introduced recently, allows for the design and construction of secure channel protocols by describing them through a simple, restricted language from which complex key de...
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
cryptographic protocols multi-party computation
2018/5/28
In this paper, we present two new and very communication-efficient protocols for maliciously secure multi-party computation over fields in the honest-majority setting with abort. Our first protocol im...
The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes (Book Review)
Weapons Inspections Verification Regimes WMD
2019/10/21
Nathan E. Busch and Joseph F. Pilat in their book The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes draw attention to the important role that politics ca...
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation of these countermeasures is challenging. Experimental security evaluation requires special equipment,...