搜索结果: 1-11 共查到“军事学 Theoretical”相关记录11条 . 查询时间(0.045 秒)
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Hardness Amplification Complexity Theory FPGA Security
2019/5/23
The era of PUFs has been characterized by the efforts put into research and the development of PUFs that are robust against attacks, in particular, machine learning (ML) attacks. In the lack of system...
We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and...
Information-Theoretical Analysis of Two Shannon's Ciphers
running-key cipher cipher equivocation Shannon cipher
2016/5/3
We describe generalized running key ciphers and
apply them for analysis of two Shannon’s methods. In particular,
we suggest some estimation of the cipher equivocation and the
probability of correct...
Less is More - Dimensionality Reduction from a Theoretical Perspective
important problem side-channel analysis
2016/4/12
Reducing the dimensionality of the measurements is an important problem in side-channel analysis. It allows to capture multi-dimensional leakage as one single compressed sample, and therefore also hel...
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Side-channel distinguisher Confusion coefficient Kolmogorov- Smirnov analysis
2016/1/26
In this paper, we carry out a detailed mathematical study of
two theoretical distinguishers based on the Kolmogorov-Smirnov (KS)
distance. This includes a proof of soundness and the derivation of cl...
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
key agreement MQV provable security
2016/1/26
Menezes–Qu–Vanstone key agreement (MQV) is intended to provide implicit key authentication
(IKA) and several other security objectives. MQV is approved and specified in five standards.
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
cryptographic protocols Bitcoin
2014/3/5
A widespread security claim of the Bitcoin system, presented in the original Bitcoin whitepaper, states that the security of the system is guaranteed as long as there is no attacker in possession of h...
Encryption-On-Demand:Practical and Theoretical Considerations
Encryption-On-Demand Alice and Bob Encryption-on-demand
2009/6/4
Alice and Bob may develop a spontaneous, yet infrequent need for online confidential
exchange. They may be served by an 'encryption-on-demand' (EoD) service which will
enable them to communicate sec...
In this paper, we give the theoretical analysis of Â2 attack
proposed by Knudsen and Meier on the RC6 block cipher. To this end, we
propose the novel method of security evaluation against &Aci...
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
Theoretical Use Cache Memory Cryptanalytic Side-Channel
2009/4/15
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being
used as a side-channel which leaks information during the run of a cryptographic
algorithm. By using this side-channel, a...
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
Theoretical cryptanalysis Klimov-Shamir number generator TF-1
2009/2/19
The internal state of the Klimov-Shamir number generator
TF-1 consists of four words of size w bits each, whereas its
intended strength is 22w. We exploit an asymmetry in its output
function to sho...