搜索结果: 1-12 共查到“军事学 Strategy”相关记录12条 . 查询时间(0.265 秒)
Practical Strategy-Resistant Privacy-Preserving Elections
cryptographic protocols Privacy voting
2018/11/19
Recent advances in cryptography promise to let us run complex algorithms in the encrypted domain. However, these results are still mostly theoretical since the running times are still much larger than...
With an historian’s keen eye for detail and nuance, John Lewis Gaddis surveys a variety of case studies from the Peloponnesian War to World War II in his new book On Grand Strategy, identifying in the...
Economic and Financial Sanctions in U.S. National Security Strategy
U.S. National Security Strategy Economic Financial Sanctions
2019/10/11
Coercive U.S. strategies often feature the use of economic and financial sanctions to address national security threats. According to the most recent U.S. National Security Strategy, sanctions and oth...
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Bitcoin Mining Selfish mining
2018/1/2
Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy space has been extended by many works. These works only analyze the stra...
This article presents a secure mutual testing strategy for System-on-Chips (SoCs) that implement cryptographic
functionalities. Such approach eliminates the need for an additional trusted component t...
A strategy for recovering roots of bivariate polynomials modulo a prime
recovering roots bivariate polynomials modulo prime
2009/6/15
We show how, when given an irreducible bivariate polynomial with
coefficients in a finite prime field and an approximation to one of its
roots, one can recover that root efficiently, if the approxim...
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
RFID Identification Authentication Meet-in-the-Middle Strategy
2009/6/12
In almost any RFID system, a reader needs to identify, and optionally authenticate, a mul-
titude of tags. If each tag has a unique secret, identification and authentication are trivial,however, the ...
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
Simultaneous Resettability Conjecture New Non-Black-Box Simulation Strategy resettable zero-knowledge proofs
2009/6/11
Canetti, Goldreich, Goldwasser, and Micali (STOC 2000) introduced the notion of
resettable zero-knowledge proofs, where the protocol must be zero-knowledge even if
a cheating verifier can reset the ...
A successful strategy was identified for any Verifier colluding with any
Issuer to distinguish honest Provers issuing DAA signatures. An additional
verification equation was introduced for a Prover ...
Unbalanced digit sets and the closest choice strategy for minimal weight integer representations
Unbalanced digit sets closest choice strategy minimal weight integer representations
2009/6/3
An online algorithm is presented that produces an optimal radix-2 representation of an
input integer n using digits from the set D`;u = fa 2 Z : ` a ug, where ` 0 and
u 1. The algorithm work...
Naval Strategy in Northeast Asia: Geo-strategic Goals, Policies, and Prospects
Naval Strategy Northeast Asia Geo-strategic Goals Policies Prospects
2009/3/13
The end of the Cold War, which essentially meant the end of the United States and Soviet Union confrontation, has brought an unpredictable international order. This transformation has caused a change...
China's Energy Strategy and Primary Role of the Middle East in This Strategy
China’s Energy Strategy Primary Role the Middle East
2015/8/19
In face of challenges to its energy security, China has been making adjustments in its energy policy and energy development strategy since mid-1990s,and implementing a strategy for overseas energy dev...