搜索结果: 1-3 共查到“知识库 军事学 strength”相关记录3条 . 查询时间(0.407 秒)
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage
efficiently searchable encryption encrypted databases
2017/11/13
Efficiently searchable and easily deployable encryption schemes enable an untrusted, legacy service such as a relational database engine to perform searches over encrypted data. The ease with which su...
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud
Threshold Cryptography Elliptic Curve Cryptography ECDSA
2015/12/18
Side-channel attacks utilize information leakage in the implementation
of an otherwise secure cryptographic algorithm to extract secret
information. For example, adversaries can extract the secret k...
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
hash functions cryptographic combiners indierentiability
2009/6/3
At Crypto 2004 Joux showed a novel attack against the concatenated hash
combiner instantiated with Merkle-Damgård iterated hash functions. His method of producing
multicollisions in the Merkle...