搜索结果: 1-15 共查到“军事学 Analyzing”相关记录19条 . 查询时间(0.046 秒)
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
EMV Universal Composability Security Models
2019/8/19
EMV, also known as Chip and PIN, is the world-wide standard for card-based electronic payment. Its security wavers: over the past years, researchers have demonstrated various practical attacks, rangin...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
maskVerif: a formal tool for analyzing software and hardware masked implementations
Glitches Masking Formal verification
2018/6/5
Masking is a popular countermeasure for protecting both hardware and software implementations against differential power analysis. A main strength of software masking is that its security guarantees c...
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
Markov Decision Process Bitcoin game theory
2017/7/19
Bitcoin has not only attracted many users but also been considered as a technical breakthrough by academia. However, the expanding potential of Bitcoin is largely untapped due to its limited throughpu...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of security when used with many different keys, by many different users. Its significance lies in the ...
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Homomorphic Commitment non-homomorphic
2017/5/15
In this paper we present SplitCommit, a portable and efficient C++ implementation of the recent additively homomorphic commmitment scheme of Frederiksen et al. [FJNT16]. We describe numerous optimizat...
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Lattice-Based Cryptography BLISS Side-Channel Analysis
2017/2/20
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, sh...
On Analyzing Program Behavior Under Fault Injection Attacks
fault attacks fault simulator instruction set simulator
2016/12/7
Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced b...
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Anonymous Communication Anonymity Metric Relationship Anonymity
2016/1/26
Anonymous communication (AC) protocols such as the widely used Tor network have been designed to
provide anonymity over the Internet to their participating users. While AC protocols have been the sub...
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
AES AES-like differential cryptanalysis
2016/1/3
Designing block ciphers and hash functions in a manner that resemble the AES in
many aspects has been very popular since Rijndael was adopted as the Advanced Encryption
Standard. However, in sharp c...
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Pseudorandom functions Even-Mansour Constructions Lower Bound Proofs in the Random Oracle Model
2015/12/29
In the last years, much research work has been invested into the security analysis of key alternating ciphers in the random oracle model. These are pseudorandom permutations (PRPs), sometimes also cal...
Analyzing the Efficiency of Biased-Fault Based Attacks
Differential Attack Fault Intensity Biased Fault
2015/12/29
The traditional fault analysis techniques developed over the
past decade rely on a fault model, a rigid assumption about the nature of
the fault. A practical challenge for all faults attacks is to i...
From Dolev-Yao to Strong Adaptive Corruption:Analyzing Security in the Presence of Compromising Adversaries
Dolev-Yao Strong Adaptive Corruption hierarchy of adversary models
2009/6/11
We formalize a hierarchy of adversary models for security
protocol analysis, ranging from a Dolev-Yao style adversary
to more powerful adversaries who can reveal different parts
of principals’ stat...
Framework for Analyzing Optimistic Fair Exchange with Distributed Arbiters
Framework Analyzing Optimistic Fair Exchange Distributed Arbiters
2009/6/11
We nominate Alptekin K¨upc¸ ¨u for the Best Student Paper Award
Abstract
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has
something that Bob ...
ANALYZING THE GALBRAITH-LIN-SCOTT POINT MULTIPLICATION METHOD FOR ELLIPTIC CURVES OVER BINARY FIELDS
Galbraith-Lin-Scott Point Multiplication Method Elliptic Curves Binary Fields
2009/6/5
Galbraith, Lin and Scott recently constructed efficiently-computable endomorphisms
for a large family of elliptic curves defined over Fq2 and showed, in the case where q is prime, that
the Gallant-L...