搜索结果: 46-60 共查到“课件 军事学”相关记录116条 . 查询时间(1.562 秒)
At Indocrypt 2016, Ashur et al. showed that linear hulls are sometimes formed in a single round of a cipher (exemplifying on Simon ciphers) and showed that the success rate of an attack may be influen...
On the Hardness of the Computational Ring-LWR Problem and its Applications
Lattice Techniques Public Key Cryptography
2018/6/5
In this paper, we propose a new assumption, the Computational Learning With Rounding over rings, which is inspired by the computational Diffie-Hellman problem. Assuming the hardness of ring-LWE, we pr...
青岛理工大学中华文明史课件第4讲 秦兵马俑与古代军事成就
青岛理工大学 中华文明史 课件 第4讲 秦兵马俑与古代军事成就
2018/2/6
青岛理工大学中华文明史课件第4讲 秦兵马俑与古代军事成就。
A multi-start heuristic for multiplicative depth minimization of boolean circuits
boolean functions homomorphic encryption multiplicative depth
2017/6/1
In this work we propose a multi-start heuristic which aims at minimizing the multiplicative depth of boolean circuits. The multiplicative depth objective is encountered in the field of homomorphic enc...
Leakage-Resilient Tweakable Encryption from One-Way Functions
Tweakable-weak PRF symmetric key tweakable weak hash proof system tweakable encryption
2017/5/31
In this paper, we initiate the study of leakage-resilient tweakable encryption schemes in the relative key-leakage model, where the adversary can obtain (arbitrary) partial information about the secre...
Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS’s), use abstract threat models that capture neither realistic databases, nor realistic att...
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Aggregator Oblivious Encryption Public Verifiability
2017/5/31
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since...
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Privacy-preserving machine learning secure computation
2017/5/11
Machine learning is widely used in practice to produce predictive models for applications such as image processing, speech and text recognition. These models are more accurate when trained on large am...
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations
AND-DL AND-RSA
2017/5/8
Following the framework of Harnik and Naor, we introduce the notion of tailored instance compression to capture the essence of the known one-more like assumptions, which provides new insight into the ...
Another Look at Success Probability in Linear Cryptanalysis
linear cryptanalysis success probability data complexity
2017/5/8
This work studies the success probability of linear cryptanalysis. Complete expressions for the success probability are obtained using two different approaches, namely the order statistics and the hyp...
西安邮电大学通信与信息工程学院密码学基础课件第1章 古典密码
西安邮电大学通信与信息工程学院 密码学基础 课件 第1章 古典密码
2017/3/17
西安邮电大学通信与信息工程学院密码学基础课件第1章 古典密码。
西安邮电大学通信与信息工程学院密码学基础课件第2章 分组密码
西安邮电大学通信与信息工程学院 密码学基础 课件 第2章 分组密码
2017/3/17
西安邮电大学通信与信息工程学院密码学基础课件第2章 分组密码。
西安邮电大学通信与信息工程学院密码学基础课件第3章 序列密码
西安邮电大学通信与信息工程学院 密码学基础 课件 第3章 序列密码
2017/3/17
西安邮电大学通信与信息工程学院密码学基础课件第3章 序列密码。
西安邮电大学通信与信息工程学院密码学基础课件第5章 公钥密码
西安邮电大学通信与信息工程学院 密码学基础 课件 第5章 公钥密码
2017/3/17
西安邮电大学通信与信息工程学院密码学基础课件第5章 公钥密码。
西安邮电大学通信与信息工程学院密码学基础课件第6章 数字签名
西安邮电大学通信与信息工程学院 密码学基础 课件 第6章 数字签名
2017/3/17
西安邮电大学通信与信息工程学院密码学基础课件第6章 数字签名。