搜索结果: 1-5 共查到“军事学 Report”相关记录5条 . 查询时间(0.078 秒)
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
attack trapdoor subgroup congruential equations
2016/5/30
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". The schemes make ...
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
homomorphic encryption lattice-based cryptography
2015/12/23
We give a theoretical description of a new homomorphic encryption
scheme DA-Encrypt that is based on (non-archimedean) Diophantine
Approximation.
Cryptology ePrint Archive: Report 2013/112
Physical Unclonable Functions Machine Learning Cryptanalysis Physical Cryptography
2013/4/18
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a Strong PUF, our ...
Cryptology ePrint Archive: Report 2011/099Can Code Polymorphism Limit Information Leakage?
cryptographic protocols / side channels polymorphism
2011/3/10
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not i...
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI
Solution-Verification Proof-of-Work Protocol Merkle Trees A/390/CRI
2008/5/22
Proof-of-work schemes are economic measures to deter
denial-of-service attacks: service requesters compute
moderately hard functions that are easy to check
by the provider.