搜索结果: 1-3 共查到“军队指挥学 tamper-resilient cryptography”相关记录3条 . 查询时间(0.059 秒)
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
black-box separation simulatable attack tamper-resilience
2018/6/5
In this work, we show negative results on the tamper-resilience of a wide class of cryptographic primitives with uniqueness properties, such as unique signatures, verifiable random functions, signatur...
On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses
Tampering Randomness Fourier Analysis Encryption.
2013/4/18
We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers th...
Tamper Resilient Cryptography Without Self-Destruct
tamper resilience general compiler provable security
2013/4/18
We initiate a general study of schemes resilient to both tampering and leakage attacks. Tampering attacks are powerful cryptanalytic attacks where an adversary can change the secret state and observes...