搜索结果: 1-15 共查到“军事学 BEST”相关记录18条 . 查询时间(0.046 秒)
Best Information is Most Successful
Side-Channel Analysis Information Theory Guessing Entropy
2019/5/21
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rat...
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe
Side Channel Analysis horizontal differential electromagnetic analy-sis attack (DEMA) electromagnetic (EM) probe
2018/12/6
Implementing cryptographic algorithms in a tamper resistant way is an extremely complex task as the algorithm used and the target platform have a significant impact on the potential leakage of the imp...
We reconsider the security guarantee that can be achieved by general protocols for secure multiparty computation in the most basic of settings: information-theoretic security against a semi-honest adv...
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
cryptographic protocols Byzantine agreement
2018/3/9
In the problem of byzantine agreement (BA), a set of n parties wishes to agree on a value v by jointly running a distributed protocol. The protocol is deemed secure if it achieves this goal in spite o...
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
Fully Homomorphic Encryption FHE Encoding
2017/6/22
Fully Homomorphic Encryption (FHE) schemes are a powerful tool that allows arbitrary computations on encrypted data. This makes them a promising tool for a variety of use cases that require outsourcin...
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
S-boxes APN butterfly structure
2017/5/25
Many block ciphers use permutations defined over the finite field F22kF22k with low differential uniformity, high nonlinearity, and high algebraic degree to provide confusion. Due to the lack of knowl...
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size $2^{4k+2}$
Boolean function Sbox APN
2016/12/9
The existence of Almost Perfect Nonlinear (APN) permutations operating on an even number of variables was a long-standing open problem, until an example with six variables was exhibited by Dillon et a...
Automatic Search for the Best Trails in ARX:Application to Block Cipher Speck
Symmetric-key Cryptanalysis ARX
2016/4/26
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy, does not use a...
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Automatic cryptanalysis Related-key differential cryptanalysis Linear cryptanalysis
2016/1/7
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of
the differential and linear behavior of a wide range of block ciphers. We point out that the differential
behav...
The purpose of this paper is to compare side-by-side the NTRU and
BGV schemes in their non-scale invariant (messages in the lower bits), and their
scale invariant (message in the upper bits) forms. ...
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
Zero-Knowledge Probabilisticaly Checkable Proofs Leakage-Resilience
2015/12/21
A Probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form ``$x\in L$'' by querying onl...
On Achieving the“Best of Both Worldsin”Secure Multiparty Computation
Theory of cryptography secure computation
2010/2/1
Two settings are traditionally considered for secure multiparty computation, depending on
whether or not a majority of the parties are assumed to be honest. Protocols designed under
this assumption ...
Results from a Search for the Best Linear Approximation of a Block Cipher
Best Linear Approximation Block Cipher Substitution-Permutation Network
2009/6/3
In this paper, we investigate the application of an algorithm to find the best
linear approximation of a basic Substitution-Permutation Network block cipher. The
results imply that, while it is well...
PECDSA.How to build a DL-based digital signature scheme with the best proven security
digital signature DSA variants idealized model proven security
2009/4/15
Many variants of the ElGamal signature scheme have been
proposed. The most famous is the DSA standard. If computing discrete
logarithms is hard, then some of these schemes have been proven secure
i...
THE BEST AND WORST OF SUPERSINGULAR ABELIAN VARIETIES IN CRYPTOLOGY
abelian varieties supersingular elliptic curves
2009/4/13
For certain security applications, including identity based encryption
and short signature schemes, it is useful to have abelian varieties with security
parameters that are neither too small nor too...