搜索结果: 1-6 共查到“军事学 Investigating”相关记录6条 . 查询时间(0.125 秒)
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
CAESAR Authenticated Encryption Cube Attack
2016/12/12
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced rou...
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
criminal smart contracts zk-SNARKs
2016/4/12
Thanks to their anonymity (pseudonymity) and elimination of trusted intermediaries, cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and communities. Unfortunately...
This paper presents a thorough analysis of the AEAD scheme NORX, focussing on differential and rotational properties. We first introduce mathematical models that describe differential propagation wi...
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
discrete logarithm problem index calculus algebraic curves
2016/1/5
The function field sieve, a subexponential algorithm of complexity L(1/3) that
computes discrete logarithms in finite fields, has recently been improved to an algorithm of
complexity L(1/4) and subs...
Investigating SRAM PUFs in large CPUs and GPUs
Physically unclonable functions SRAM PUFs randomness
2015/12/24
Physically unclonable functions (PUFs) provide data
that can be used for cryptographic purposes: on the one hand randomness
for the initialization of random-number generators; on the
other hand ind...
Investigating the DPA-Resistance Property of Charge Recovery Logics
DPA-Resistance Property Charge Recovery Logics DPA attacks
2009/6/4
The threat of DPA attacks is of crucial importance when
designing cryptographic hardware. As a result, several DPA countermeasures
at the cell level have been proposed in the last years, but none
o...