搜索结果: 1-13 共查到“军事学 Complex”相关记录13条 . 查询时间(0.156 秒)
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Blockchain Smart Contracts Cryptocurrency
2019/7/22
Smart contracts are programmable, decentralized and transparent financial applications. Because smart contract platforms typically support Turing-complete programming languages, such systems are often...
Examining Complex Forms of Conflict: Gray Zone and Hybrid Challenges
Conflict Gray Zone Hybrid Challenges Defining Hybrid Warfare
2019/10/11
The Joint Force, and the national security community as a whole, must be ready and able to respond to numerous challenges across the full spectrum of conflict including complex operations during peace...
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
predicate encryption attribute-based encryption bilinear maps
2017/3/9
Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair encodings, respectively, as a simple way to construct and analyze attribute-based encryption schemes, or more generally predic...
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Complex Queries over Encrypted Data Encrypted Multimedia Data Encrypted Face Recognition
2016/5/3
Over the last few years, data storage in cloud based services has been very popular due to easy management and monetary advantages of cloud computing. Recent developments showed that such data could b...
Algorithms on Ideal over Complex Multiplication order
Gentry-Szydlo algorithm cyclotomic orders,
2016/3/1
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously
revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and
even to a more ge...
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
side-channel electromagnetic system on chip
2015/12/29
Increased complexity in modern embedded systems has presented
various important challenges with regard to side-channel attacks.
In particular, it is common to deploy SoC-based target devices with hi...
An Investigation of Complex Operations with Word-Size Homomorphic Encryption
Homomorphic encryption word-size comparison
2015/12/18
Homomorphic encryption has progressed rapidly in both effi-
ciency and versatility since its emergence in 2009. Meanwhile, a multitude
of pressing privacy needs ?ranging from cloud computing to heal...
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
malleability signatures anonymity
2013/4/18
A signature scheme is malleable if, on input a message m and a signature $\sigma$, it is possible to efficiently compute a signature $\sigma'$ on a related message $m' = T(m)$, for a transformation T ...
NON-CYCLIC SUBGROUPS OF JACOBIANS OF GENUS TWO CURVES WITH COMPLEX MULTIPLICATION
Jacobians hyperelliptic curves embedding degree complex multiplication
2009/6/2
Let E be an elliptic curve dened over a nite eld. Balasubramanian
and Koblitz have proved that if the `th roots of unity ` is not contained
in the ground eld, then a eld extension of the groun...
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
ID-Based Encryption Complex Hierarchies Forward Security Broadcast Encryption
2009/3/27
vA forward-secure encryption scheme protects secret keys from exposure by evolving the
keys with time. Forward security has several unique requirements in hierarchical identity-based
encryption (HIB...
Concealing Complex Policies with Hidden Credentials
Concealing Complex Policies Hidden Credentials
2009/3/26
Hidden credentials are useful in protecting sensitive resource requests, resources, policies and credentials.We propose a significant improvement in decryption performance when implementing hidden cre...
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Batch verification modular exponentiation sparse exponent Frobenius map
2009/2/25
Abstract. Modular exponentiation in an abelian group is one of the
most frequently used mathematical primitives in modern cryptography.
Batch verification is to verify many exponentiations simultane...
EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION
Jacobians hyperelliptic curves complex multiplication cryptography
2008/8/28
Consider the Jacobian of a genus two curve defined over a finite
field and with complex multiplication. In this paper we show that if the e-Sylow
subgroup of the Jacobian is not cyclic, then the emb...