搜索结果: 1-15 共查到“m exponent”相关记录53条 . 查询时间(0.046 秒)
A typical countermeasure against side-channel attacks consists of masking intermediate values with a random number. In symmetric cryptographic algorithms, Boolean shares of the secret are typically us...
Handling Correlated Errors: Hardness of LWE in the Exponent
Learning with errors Error-Correction Generic Group Model
2018/11/5
The hardness of decoding random linear codes with errors is a complexity-theoretic assumption with broad applications to cryptography. In contrast, Reed-Solomon codes permit efficient decoding in many...
Analyzing vegetation dynamic trend on the Mongolian Plateau based on the Hurst exponent and influencing factors from 1982-2013
remote sensing GIMMS NDVI3g vegetation dynamic trend Hurst exponent residual trend analysis Mongolian Plateau
2018/4/9
This study analyzed the spatial and temporal variations in the Normalized Difference Vegetation Index (NDVI) on the Mongolian Plateau from 1982-2013 using Global Inventory Modeling and Mapping Studies...
Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA
lattice techniques RSA cryptanalysis
2017/9/1
We present a principled technique for reducing the matrix size in some applications of Coppersmith's lattice method for finding roots of modular polynomial equations. It relies on an analysis of the a...
Since May (Crypto'02) revealed the vulnerability of the small CRT-exponent RSA using Coppersmith's lattice-based method, several papers have studied the problem and two major improvements have been ma...
Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis
Rowhammer fault attack Prime + Probe
2016/6/17
Rowhammer attacks have exposed a serious vulnerability in modern DRAM chips to induce bit flips in data which is stored in memory. In this paper, we develop a methodology to combine timing analysis to...
In this paper, we consider an RSA modulus N = pq, where
the prime factors p, q are of the same size. We present an attack on RSA
when the decryption exponent d is in the form d = M d1 + d0 where M
...
Exponent-inversion Signatures and IBE under Static Assumptions
Dual form signature Identity-based encryption Exponent inversion
2016/1/23
Boneh-Boyen signatures are widely used in many advanced cryptosystems. It has a structure of “inversion in the exponent”, and its unforgeability against q chosen-messages attack is proven under the ...
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the theory of learning in presence of errors [Regev, STOC'05] we ask if noise in the exponent amplifies i...
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Timing attack RSA CRT exponent blinding
2016/1/6
The references [9, 3, 1] treat timing attacks on RSA with
CRT and Montgomery’s multiplication algorithm in unprotected implementations.
It has been widely believed that exponent blinding would
prev...
High-precision measurement of the thermal exponent for the three-dimensional XY universality class
Accuracy of measurement measurement superfluids lipase
2014/12/20
Simulation results are reported for the critical point of the two-component ϕ4 field theory. The correlation-length exponent is measured to high precision with the result ν=0.6717(3). This value ...
A Critical Exponent of Fujita Type for a Nonlinear Reaction-Di usion System on Riemannian Manifold
critical exponent reaction-diusion system Riemannian manifold.
2018/4/19
In this paper, we study the global existence and nonexistence of positive solutions to the
following nonlinear reaction-diusion system
8>>>>>>>>>>>><
>>>>>>>>>>>>:
ut u = W(x)vp + S(x...
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3
foundations / Random self-reducibility Learning with errors Post-quantum cryptography Non-commutative cryptography Burnside groups
2012/3/27
In this work we investigate the hardness of a computational problem introduced in the recent work of Baumslag et al. In particular, we study the $B_n$-LHN problem, which is a generalized version of th...
A Unified Framework for Small Secret Exponent Attack on RSA
public-key cryptography / lattice techniques RSA cryptanalysis
2012/6/14
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation: $x(N+1+y)+1 ¥equiv 0 mod ...
A Unified Framework for Small Secret Exponent Attack on RSA
public-key cryptography / lattice techniques RSA cryptanalysis
2012/3/22
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation: $x(N+1+y)+1 quiv 0 mod e...