搜索结果: 1-10 共查到“军事学 Unknown”相关记录10条 . 查询时间(0.125 秒)
Solving Linear Equations Modulo Unknown Divisors: Revisited
Lattice-based analysis Linear modular equations RSA
2016/1/9
We revisit the problem of finding small solutions to a collection
of linear equations modulo an unknown divisor p for a known
composite integer N. In CaLC 2001, Howgrave-Graham introduced an
effici...
Secret sharing allows a dealer to distribute a secret among multiple parties such that
authorized coalitions can reconstruct the secret. Traditionally, the dealer knows the exact
share each user hol...
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
self-bilinear map indistinguishability obfuscation multilinear map
2016/1/4
A self-bilinear map is a bilinear map where the domain and target groups are identical. In
this paper, we introduce a self-bilinear map with auxiliary information which is a weaker variant
of a self...
Results on polynomial interpolation with mixed modular operations and unknown moduli
mixed modular operations unknown moduli
2015/12/22
Motivated by a recently introduced HIMMO key predistribution scheme, we
investigate the limits of various attacks on the polynomial interpolation problem with mixed
modular operations and hidden mod...
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower
Witness encryption smooth projective hash functions ring signatures
2015/12/21
Witness encryption (WE) is a recent powerful encryption paradigm. It greatly
extends the scope of encryption as it allows to encrypt a message using the description
of a hard problem (a word in some...
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
Side Channel Attacks Information Theory
2010/7/14
In Backes&Kopf(2008), the authors introduced an important new information theoretic numerical measure for assessing a system's resistance to unknown-message side-channel attacks and computed a formula...
Fault Attacks on RSA Signatures with Partially Unknown Messages
Fault attacks digital signatures rsa
2009/7/14
Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices.
In the late 90’s, Boneh, DeMillo and Lipton [6] introduced fault-based attacks on crt-rsa. These attac...
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks(Full Version)
Formally Bounding Side-Channel Leakage Unknown-Message Attacks
2009/6/3
We propose a novel approach for quantifying a system's resistance
to unknown-message side-channel attacks. The approach is based
on a measure of the secret information that an attacker can extract f...
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown
cryptanalysis authentication password
2009/3/23
In 1988, Harn, Laih and Huang proposed a password authentication scheme based on
quadratic residues. However, in 1995, Chang, Wu and Laih pointed out that if the parameters
a ,b ,d and l are known b...
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
authenticated key agreement unknown key-share resilience bilateral unknown key-share resilienc
2008/8/25
Unknown Key-Share (UKS) resilience is a basic security attribute
in authenticated key agreement protocols, whereby two entities A and
B should not be able to be coerced into sharing a key between th...