搜索结果: 1-6 共查到“军事学 Degradation”相关记录6条 . 查询时间(0.109 秒)
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of security when used with many different keys, by many different users. Its significance lies in the ...
Leakage-Resilient Signatures with Graceful Degradation
public-key cryptography leakage resilience
2016/1/8
We investigate new models and constructions which allow leakage-resilient signatures secure
against existential forgeries, where the signature is much shorter than the leakage bound. Current
models ...
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
public-key cryptography leakage resilient cryptography
2016/1/6
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable
against an adversary leaking arbitrary (yet bounded) information on the entire state of the
signer (sometimes kno...
Amplifying Side Channels Through Performance Degradation
cryptanalysis side-channel ECDSA
2015/12/21
Interference between processes executing on shared
hardware can be used to mount performance-degradation attacks.
However, in most cases, such attacks offer little benefit for the
adversary. In thi...
Graceful Degradation in Multi-Party Computation
cryptographic protocols / Multi-party computation graceful degradation hybrid security mixed adversaries
2012/3/29
The goal of \emph{Multi-Party Computation} (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of $n$ parties runs a protocol ...
Degradation and Amplification of Computational Hardness
Commitment schemes Hardness amplification and degradation Oblivious transfer
2009/6/3
What happens when you use a partially defective bit-commitment protocol to commit to the
same bit many times? For example, suppose that the protocol allows the receiver to guess the
committed bit wi...