搜索结果: 1-14 共查到“军事学 Public Keys”相关记录14条 . 查询时间(0.08 秒)
In many applications, it is important to verify that an RSA public key (N,e) specifies a permutation, in order to prevent attacks due to adversarially-generated public keys. We design and implement a ...
Field lifting for smaller UOV public keys
Post-Quantum Cryptography Multivariate Cryptography Signature Schemes
2017/8/17
Most Multivariate Quadratic (MQ) signature schemes have a very large public key, which makes them unsuitable for many applications, despite attractive features such as speed and small signature sizes....
Efficient compression of SIDH public keys
Post-quantum cryptography Diffie-Hellman key exchange supersingular elliptic curves
2016/12/8
Supersingular isogeny Diffie-Hellman (SIDH) is an attractive candidate for post-quantum key exchange, in large part due to its relatively small public key sizes. A recent paper by Azarderakhsh, Jao, K...
It is common knowledge that RSA can fail when used with weak random number generators. In this paper we present two algorithms that we used to find vulnerable public keys together with a simple proced...
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
lattices digital signatures homomorphic cryptography
2016/1/6
We present a lattice-based stateless signature scheme provably secure in the standard model. Our
scheme has a constant number of matrices in the public key and a single lattice vector (plus a tag) in...
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Public-Key Cryptography Programmable Hash Functions Digital Signatures
2015/12/23
We introduce the notion of asymmetric programmable hash functions (APHFs, for short),
which adapts Programmable Hash Functions, introduced by Hofheinz and Kiltz at Crypto 2008, with
two main differe...
Computing information on domain parameters from public keys selected uniformly at random
ECC elliptic curve domain parameters
2015/12/23
The security of many cryptographic schemes and protocols rests on the
conjectured computational intractability of the discrete logarithm problem
in some group hgi of prime order. Such schemes and pr...
Cryptanalysis of NTRU with two public keys
public-key cryptography / NTRU cryptosystem Lattice attacks Cryptanalysis
2012/3/26
NTRU is a fast public key cryptosystem presented in 1996 by Hoffstein, Pipher and Silverman. It operates in the ring of truncated polynomials. In NTRU, a public key is a polynomial defined by the comb...
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
public-key cryptography / Fully Homomorphic Encryption
2012/3/26
At Eurocrypt 2010 van Dijk {\sl et al.} described a fully homomorphic encryption scheme over the integers. The main appeal of this scheme (compared to Gentry's) is its conceptual simplicity. This simp...
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
implementation / MQ Multivariate Quadratic UOV Unbalanced Oil and Vinegar
2012/3/28
Security of public key schemes in a post-quantum world is a challenging task---as both RSA and ECC will be broken then. In this paper, we show how post-quantum signature systems based on Multivariate ...
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
MQ, Multivariate Quadratic UOV Unbalanced Oil and Vinegar
2011/6/9
Security of public key schemes in a post-quantum world is a challenging task---as both RSA and ECC will be broken then. In this paper, we show how post-quantum signature systems based on Multivariate ...
Various security notions are relevant for predicate encryption schemes. First of all, one wants the ciphertexts to hide its attributes (this property is called semantic security). In addition, it make...
Adaptive Concurrent Non-Malleability with Bare Public-Keys
Adaptive Concurrent Non-Malleability Bare Public-Keys
2010/3/16
Concurrent non-malleability (CNM) is central for cryptographic protocols running concurrently
in environments such as the Internet. In this work, we formulate CNM in the bare public-key (BPK)
model,...
CRUST: Cryptographic Remote Untrusted Storage without Public Keys
CRUST Cryptographic Untrusted Storage Public Keys
2008/8/18
This paper presents CRUST, a stackable le system layer designed to provide secure le sharing
over remote untrusted storage systems. CRUST is intended to be layered over insecure network le
systems w...