搜索结果: 1-12 共查到“军事学 10”相关记录12条 . 查询时间(0.668 秒)
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
Zero-knowledge efficiency privacy-preserving protocols
2019/8/30
We present a new 4-move special honest-verifier zero-knowledge proof of knowledge system for proving that a vector of Pedersen commitments opens to a so-called "one-hot" vector (i.e., to a vector from...
复旦大学计算机科学与技术学院信息安全原理课件 信息安全10。
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Transport Layer Security (TLS) key exchange protocol analysis
2016/2/23
We analyze the handshake protocol of TLS 1.3 draft-ietf-tls-tls13-10 (published October 2015). This continues and extends our previous analysis (CCS 2015, Cryptology ePrint Archive 2015) of former TLS...
We prove that a (balanced) 10-round Feistel network is indifferentiable from a random permutation. In a previous seminal result, Holenstein et al. had established indifferentiability of Feistel at 14 ...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et
al. (Journal of Cryptology, 2014) proved that a 14-round Feistel network using random, independent,
keyed round...
A Note on the Indifferentiability of the 10-Round Feistel Construction
block cipher Feistel construction indifferentiability
2015/12/23
Holenstein et al. (STOC 2011) have shown that the Feistel construction with fourteen
rounds and public random round functions is indifferentiable from a random permutation. In the
same paper, they p...
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Key Recovery Attacks Practical Complexity AES Variants
2009/8/7
AES is the best known and most widely used block cipher. Its three versions (AES-
128, AES-192, and AES-256) dier in their key sizes (128 bits, 192 bits and 256 bits) and in their
number of rounds ...
IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
Public key cryptography encryption
2009/6/5
Specifications of common public-key cryptographic techniques based on 1 hard problems over
lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical
primitives f...
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
PEKE Probabilistic Encryption Key Exchange PEKEv1.25 Specifications
2009/2/12
This document revisits the PEKE (Probabilistic Encryption Key Exchange) cryptosystem
and proposes the enhanced PEKEv1.25 that performs a hash computation on the original PEKE
output in order to impr...
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
Pairing-Friendly Elliptic Curves Embedding Degree
2008/10/22
We present a general framew
ork for constructing families
of elliptic curves of prime order with prescribed embedding degree. We
demonstrate this method by constructing curves with embedding degree...
Implementing Cryptographic Pairings Over Curves of Embedding Degrees 8 and 10
bilinear pairings cryptography pairing-friendly curves
2008/5/22
In this paper, we will describe efficient implementations of
the Tate and Ate pairings over ordinary elliptic curves of embedding degrees
8 and 10. We will discuss the possible curve-dependent optim...
美军研制APY-10侦察与跟踪雷达
APY-10侦察 跟踪雷达
2006/8/29
[法国《宇航防务》2006年8月25日报道] 针对美国海军P-8A多功能海上飞机(Multi-mission Maritime Aircraft,MMA)项目,雷声公司提前向波音公司交付了雷达任务系统集成实验室(Mission Systems Integration Laboratory,MSIL)。MSIL是安装在P-8A飞机上的APY-10雷达(由雷声公司生产)集成的主要部件。这是2006年雷...