搜索结果: 1-15 共查到“军事学 multiple”相关记录75条 . 查询时间(0.078 秒)
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
time-memory trade-off representations parallel collision search
2019/7/15
For enabling post-quantum cryptanalytic experiments on a meaningful scale, there is a strong need for low-memory algorithms. We show that the combination of techniques from representations, multiple c...
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Cryptocurrencies Lattice-Based Cryptography Post-Quantum Cryptography
2019/5/28
This paper presents the Lattice-based Ring Confidential Transactions (Lattice RingCT v2.0) protocol. Unlike the previous Lattice RingCT v1.0 (LRCT v1.0) protocol, the new protocol supports Multiple-In...
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Unlinkability Privacy Advertising
2019/4/11
Online Social Networks (OSNs) offer free storage and social networking services through which users can communicate personal information with one another. The personal information of the users collect...
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
MergeMAC universal forgery multiple forgeries
2018/9/6
This article presents universal forgery and multiple forgeries against MergeMAC that has been recently proposed to fit scenarios where bandwidth is limited and where strict time constraints apply. Mer...
Randomness analysis for multiple-recursive matrix generator
Linear feedback shift register stream cipher randomness
2018/6/19
Randomness testing of binary sequences generated by any keystream generator is of paramount importance to both designer and attacker. Here we consider a word-oriented keystream generator known as mult...
Faster Bootstrapping with Multiple Addends
fully homomorphic encryption bootstrapping process accumulator
2017/8/2
As an important cryptographic primitive in cloud computing and outsourced computation, fully homomorphic encryption (FHE) is an animated area of modern cryptography. However, the efficiency of FHE has...
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
multidimensional linear cryptanalysis multiple linear cryptanalysis chi-squared distribution
2017/8/1
This work considers statistical analysis of attacks on block ciphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypothes...
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
information theory secret sharing
2017/7/6
The present report contains a proof of a linear lower bound for a typical three-party secure computation scheme of nn independent ANDAND functions. The goal is to prove some linear communication lower...
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
collision resistance multi collisions commitments
2017/6/1
A collision resistant hash (CRH) function is one that compresses its input, yet it is hard to find a collision, i.e. a x1≠x2x1≠x2 s.t. h(x1)=h(x2)h(x1)=h(x2). Collision resistant hash functions are on...
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
differential cryptanalysis independent S-box fixed key
2017/5/31
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differenti...
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
multiple linear cryptanalyis LLR statistic chi-squared statistic
2016/4/26
The log-likelihood ratio (LLR) test statistic has been proposed in the literature for performing statistical analysis of attacks on block ciphers. A limitation of the LLR test statistic is that its ap...
Multiple Differential Cryptanalysis: A Rigorous Analysis
multiple differential cryptanalysis Chernoff bounds martingales
2016/4/26
Statistical analysis of multiple differential attacks are considered in this paper. Following the work of
Blondeau and G磂rard, the most general situation of multiple differential attack where there a...
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
lightweight cryptography block cipher design bit-slice
2016/1/26
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main
idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice
techniques. RECTAN...
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Differential cryptanalysis PRINCE multiple differentials
2016/1/26
PRINCE is a lightweight block cipher proposed by Borghoff
et al. at Asiacrypt 2012. Due to its originality, novel design and low number
of rounds, it has already attracted the attention of a large n...
Tight security bounds for multiple encryption
multiple encryption cascade ciphers provable security
2016/1/26
Multiple encryption---the practice of composing a blockcipher several times with itself under independent keys---has received considerable attention of late from the standpoint of provable security. D...