搜索结果: 1-15 共查到“Easy”相关记录55条 . 查询时间(0.077 秒)
Done right, a sprinter’s race lasts only a few seconds. Sprinting is not an “easy” sport. But the sprinter’s diet might be a little different from those of other athletes, because sprinters’ bodies us...
Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves
elliptic curve cryptosystem pairing inversion Tate pairing
2019/4/16
We present a simple algorithm for Miller inversion for the reduced Tate pairing on supersingular elliptic curve of trace zero defined over the finite fields with q elements. Our algorithm runs with O(...
Hard and easy problems for supersingular isogeny graphs
isogeny-based cryptography cryptanalysis
2017/10/9
We consider the endomorphism ring computation problem for supersingular elliptic curves, constructive versions of Deuring's correspondence, and the security of Charles-Goren-Lauter's cryptographic has...
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Attribute-based encryption Predicate encoding Prime-order bilinear group
2017/9/13
Among all existing identity-based encryption (IBE) schemes in the bilinear group, Wat-IBE proposed by Waters [CRYPTO, 2009] and JR-IBE proposed by Jutla and Roy [AsiaCrypt, 2013] are quite special. A ...
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups
secure messaging group communication confidentiality
2017/8/21
Secure messaging systems such as TextSecure and Signal aim, among others, at providing authenticated and confidential channels between two or more communicating users. The general understanding seems ...
It has long been viewed that the analysis of sodium excretion in a morning “spot” urine sample is a valuable measure to estimate salt intake of the previous day. A study in this issue of the Journal s...
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Side-channel analysis Lightweight cryptography Machine learning
2017/3/27
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES. A...
Key enumeration solutions are post-processing schemes for the output sequences of side channel distinguishers, the application of which are prevented by very large key candidate space and computation ...
Electronic circuits are found in almost everything from smartphones to spacecraft and are useful in a variety of computational problems from simple addition to determining the trajectories of interpla...
Major advance in solar cells made from cheap,easy-to-use perovskite
solar cells cheap perovskite
2016/11/29
Solar cells made from an inexpensive and increasingly popular material called perovskite can more efficiently turn sunlight into electricity using a new technique to sandwich two types of perovskite i...
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
public-key cryptography functional encryption
2016/3/23
Semi-adaptive security is a notion of security that lies between selective and adaptive security for Attribute-Based Encryption (ABE) and Functional Encryption (FE) systems. In the semi-adaptive model...
Side-channel attacks generally rely on the availability of good
leakage models to extract sensitive information from cryptographic implementations.
The recently introduced leakage certification test...
The 3D Photo-Logging System for Easy and Effective Recording and Understanding of Archaeological Sites
Camera phone 3D viewpoint GPS motion sensor photograph documentation
2015/11/12
A “3D photo-logging system,” a new method for recording archaeological sites, was developed. The prototype system consists of several servers running on a single machine and logging units composed of ...
Generating Referring Expressions: Making Referents Easy to Identify
Referents Referring Expressions
2015/9/2
It is often desirable that referring expressions be chosen in such a way that their referents are easy
to identify. This article focuses on referring expressions in hierarchically structured domains,...
Under-constrained Execution:Making Automatic Code Destruction Easy and Scalable
Bug finding symbolic execution dynamic analysis
2015/8/7
Software testing is well-recognized as a crucial part of the modern software development process. However, manual testing is labor intensive and often fails to produce impressive coverage results. Ran...