搜索结果: 1-15 共查到“军事学 Fast”相关记录216条 . 查询时间(0.437 秒)
Fast, Compact, and Expressive Attribute-Based Encryption
attribute-based encryption standard assumption non-monotone
2019/8/27
Attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build various types of access control systems. Toward the goal of making ABE more practical, we propose key-policy (KP)...
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Secure Multiparty Computation Guaranteed Output Delivery Fairness
2019/7/26
Secure Multi-party Computation (MPC) with small population and honest majority has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer...
A Fast Characterization Method for Optical Fault Injection
Physical attacks Fault injection Fast space characterization
2019/7/26
Semi-invasive fault injection attacks, such as optical fault injection, are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selectio...
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
verification secret-key cryptography elliptic curves
2019/7/8
We present EverCrypt: a comprehensive collection of verified, high-performance cryptographic functionalities available via a carefully designed API. The API provably supports agility (choosing between...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
SIKE post-quantum cryptography isogeny-based cryptography FPGA
2019/6/19
In this work, we present a fast parallel architecture to perform supersingular isogeny key encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture that uses fast and par...
We present a scalable database join protocol for secret shared data in the honest majority three party setting. The key features of our protocol are a rich set of SQL-like join/select queries and the ...
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
hash functions elliptic curve cryptosystem implementation
2019/4/23
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family have experienced a resurgence in popularity due to their use in a number of real-world projects. One particular Barreto-Lynn-Scott cur...
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Fast algebraic immunity Majority function Algebraic immunity
2019/3/20
Boolean functions used in some cryptosystems of stream ciphers should satisfy various criteria simultaneously to resist some known attacks. The fast algebraic attack (FAA) is feasible if one can find ...
Mon$\mathbb{Z}_{2^k}$a: Fast Maliciously Secure Two Party Computation on $\mathbb{Z}_{2^k}$
cryptographic protocols protocol consists
2019/2/28
In this paper we present a new 2-party protocol for secure computation over rings of the form Z2kZ2k. As many recent efficient MPC protocols supporting dishonest majority, our protocol consists of a h...
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Number Theoretic Transform Large-Degree Polynomial Multiplication Fan-Vercauteren
2019/2/27
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized NTT-based polynomial multiplier architecture, which proves to be effective as an accelerator for lat...
A threshold signature scheme enables distributed signing among nn players such that any subgroup of size t+1t+1 can sign, whereas any group with tt or fewer players cannot. While there exist previous ...