搜索结果: 1-11 共查到“军事学 Made”相关记录11条 . 查询时间(0.156 秒)
Sharing of Encrypted files in Blockchain Made Simpler
blockchain proxy re-encryption self-encryption
2019/4/25
Recently, blockchain technology has attracted much attention of the research community in several domains requiring transparency of data accountability, due to the removal of intermediate trust assump...
A traitor tracing scheme is a public key encryption scheme for which there are many secret decryption keys. Any of these keys can decrypt a ciphertext; moreover, even if a coalition of users collude, ...
In the area of distributed graph algorithms a number of network's entities with local views solve some computational task by exchanging messages with their neighbors. Quite unfortunately, an inherent ...
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Attribute-based encryption Predicate encoding Prime-order bilinear group
2017/9/13
Among all existing identity-based encryption (IBE) schemes in the bilinear group, Wat-IBE proposed by Waters [CRYPTO, 2009] and JR-IBE proposed by Jutla and Roy [AsiaCrypt, 2013] are quite special. A ...
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
ARMv8-A NEON ARM Cortex-A53 Post-Quantum Key Exchange
2017/5/5
NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have b...
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
public-key cryptography functional encryption
2016/3/23
Semi-adaptive security is a notion of security that lies between selective and adaptive security for Attribute-Based Encryption (ABE) and Functional Encryption (FE) systems. In the semi-adaptive model...
Divisible E-cash systems allow users to withdraw a unique coin of value 2n
from a bank, but
then to spend it in several times to distinct merchants. In such a system, whereas users want anonymity of...
Suit up! Made-to-Measure Hardware Implementations of Ascon
Authenticated encryption CAESAR competition hardware design
2016/1/5
Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition. In this paper...
Sequential aggregate signature (SAS) is a special type of public-key signature that allows a signer to add his signature into a previous aggregate signature in sequential order. In this case, since ma...
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$
elliptic curve discrete logarithm index calculus Weil descent decomposition attack
2012/3/30
We present a new variant of cover and decomposition attacks on the elliptic curve discrete logarithm problem, that combines Weil descent and decomposition-based index calculus into a single discrete l...
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over Fp6
elliptic curve discrete logarithm index calculus Weil descent decomposition attack
2011/1/18
We present a new variant of cover and decomposition attacks on the elliptic curve discrete logarithm problem, that combines Weil descent and decomposition-based index calculus into a single discrete l...