搜索结果: 1-15 共查到“军事学 Performance”相关记录51条 . 查询时间(0.109 秒)
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
FV homomorphic encryption latticebased cryptography polynomial multiplication
2019/2/25
Homomorphic encryption is a tool that enables computation on encrypted data and thus has applications in privacy-preserving cloud computing. Though conceptually amazing, implementation of homomorphic ...
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Internet of Things Elliptic curve cryptosystems Side-channel attack
2019/1/9
The main objective of the Internet of Things is to interconnect everything around us to obtain information which was unavailable to us before, thus enabling us to make better decisions. This interconn...
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Data oblivious computing constant time computing secure hardware
2018/11/19
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in hardware security today. Recently, there has been a surge of effort that attempts to block these leakages ...
In this paper a ‘FPGA cluster’ based framework for high performance Cryptanalysis has been proposed. The framework abstracts underlying networked FPGA cluster into a unified acceleration resource. It ...
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Lattice-Based Cryptography Homomorphic Encryption Scale-Invariant Scheme
2018/6/13
Homomorphic encryption provides the ability to compute on encrypted data without ever decrypting them. Potential applications include aggregating sensitive encrypted data on a cloud environment and co...
On the Performance of Deep Learning for Side-channel Analysis
Side-channel analysis Machine learning Deep learning
2018/1/12
Profiled side-channel attacks represent the most powerful category of side-channel attacks. There we have a number of methods promising to work well in a number of different scenarios. Still, the area...
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
ASIC Implementation FPGA Authenticated Encryption
2018/1/2
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time. Due to the...
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance
SSE cryptographic protocols
2017/11/21
Searchable Symmetric Encryption (SSE) has been widely applied in the design of encrypted database for exact queries or even range queries in practice. In spite of its efficiency and functionalities, i...
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
AES access-driven cache attacks
2017/9/21
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES...
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Public Key Encryption Keyword Search
2017/8/10
Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciphertexts using a receiver’s public key and upload them to a server. Upon receiving a keyword-search t...
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Micro-Architectural Side-Channel-Attack Hardware Performance Counters Machine Learning
2017/6/15
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elegant encryption algorithms. Even though there exist various defense mechanisms, most of them come with...
FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA
Post-quantum cryptography elliptic curve cryptography (ECC) isogeny-based cryptography
2016/7/7
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the
literature. Particularly, we present the first implementation of the supersin...
On the Security and Performance of Proof of Work Blockchains
Blockchain Security Performance
2016/6/6
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital currencies. Although the security provisions of Bitcoin have been tho...
cMix is a cryptographic protocol for mix networks that uses precomputations of a group-homomorphic encryption function to avoid all real-time public-key operations by the senders, mix nodes, and recei...
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Block ciphers Stream ciphers Encryption time
2016/1/25
In open literature there is a lack of focus on Shannon‟s secrecy of ciphers as
a security measurement of symmetric key encryption, hence in this research,
Shannon‟s theories on secrecy o...