搜索结果: 1-15 共查到“军事学 Metric”相关记录16条 . 查询时间(0.062 秒)
We describe a variation of the Schnorr-Lyubashevsky approach to devising signature schemes that is adapted to rank based cryptography. This new approach enables us to obtain a randomization of the sig...
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
code-based cryptography rank-metric codes interleaving
2018/12/19
A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed.The FL cryptosystem is based on the hardness of list decoding Gabidulin codes which are special rank-metric codes. We...
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Code-based cryptography Public key cryptography Cryptosystem
2018/8/28
We present and analyze the performance of DRANKULA, a McEliece-like cryptosystem implementation using \textit{rank metric} instead of Hamming distance. Namely, we use the scheme proposed by Loidreau i...
Revocable Identity-based Encryption from Codes with Rank Metric
Code-based Cryptography Identity-based Encryption Key Revocation
2018/5/2
In this paper, we present an identity-based encryption scheme from codes with efficient key revocation. Recently, in Crypto 2017, Gaborit et al. proposed a first identity-based encryption scheme from ...
A polynomial attack on a NIST proposal: RankSign, a code-based signature in rank metric
public-key cryptography NIST
2018/4/17
RankSign is a code-based signature scheme proposed to the NIST competition for post-quantum cryptography [AGHRZ17]. It is based on the rank metric and enjoys remarkably small key sizes, about 10KBytes...
Identity-based Encryption from Codes with Rank Metric, Full Version
Code-based cryptography Rank metric IBE
2017/6/6
Code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signatur...
A new rank metric codes based encryption scheme
McEliece encryption scheme code based cryptography
2017/3/13
We design a new McEliece-like rank metric based encryption scheme from Gabidulin codes. We explain why it is not affected by the invariant subspace attacks also known as Overbeck's attacks. The idea o...
Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
fuzzy extractors reusability adaptive fuzzy extractors
2016/12/7
A Fuzzy Extractor (Dodis et al., Eurocrypt 2004) is a two-step protocol that turns a noisy secret into a uniformly distributed key R. To eliminate noise, the generation procedure takes as inputs an en...
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants
Architectural bias arbiter PUF (APUF) double APUF (DAPUF)
2016/1/27
This paper introduces the notion of Architectural Bias, which can be used to measure the influence of the architecture of Arbiter Physically Unclonable Functions (APUFs) on the quality of its outputs....
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Pseudoentropy Dense Model Theorem Convex Approximation
2016/1/6
The notion of HILL Entropy appeared in the breakthrough construction of a PRG from any one-way function (H錽tad et al.), and has become the most important and most widely used variant of computational ...
RankSign : an efficient signature algorithm based on the rank metric
code based crypto rank metric
2014/3/6
In this paper we propose a new approach to code-based signatures that makes use in particular of rank metric codes. When the classical approach consists in finding the unique preimage of a syndrome th...
A protocol is introduced to show an upper bound for rank of a square
matrix.Prover shows his knowledge of matrix elements committed, as well as a
statement regarding the matrix with a protocol intro...
On Zigzag Functions and Related Objects in New Metric
Cryptography Zigzag functions Quorum systems
2009/1/4
In this paper we will investigate the properties of zigzag functions. The zigzag functions, introduced
in [2] and used for efficient oblivious transfer in [14] were later generalized to s-zigzag
fun...
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
Passwords Password-Based Authentication and Key Exchange (PAKE) Damerau-Levenshtein String-Edit Distance M
2008/12/24
It is well understood that passwords must be very
long and complex to have sufficient entropy for security
purposes. Unfortunately, these passwords tend to
be hard to memorize, and so alternatives ...