搜索结果: 1-7 共查到“军事学 Unified Framework”相关记录7条 . 查询时间(0.078 秒)
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning
fully homomorphic encryption Ring-LWE neural network
2018/8/21
This work describes a common framework for scale-invariant families of fully homomorphic schemes based on Ring-LWE, unifying the plaintext space and the noise representation. This new formalization al...
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Aggregate signatures trapdoor permutations ideal cipher model
2018/1/19
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
A Unified Framework for Secure Search Over Encrypted Cloud Data
encrypted cloud data multi-keyword search k-nearest neighbor
2017/5/31
This paper presents a unified framework that supports different types of privacy-preserving search queries over encrypted cloud data. In the framework, users can perform any of the multi-keyword searc...
A Unified Framework for Small Secret Exponent Attack on RSA
public-key cryptography / lattice techniques RSA cryptanalysis
2012/6/14
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation: $x(N+1+y)+1 ¥equiv 0 mod ...
A Unified Framework for Small Secret Exponent Attack on RSA
public-key cryptography / lattice techniques RSA cryptanalysis
2012/3/22
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation: $x(N+1+y)+1 quiv 0 mod e...
A Unified Framework for Small Secret Exponent Attack on RSA
public-key cryptography / lattice techniques RSA cryptanalysis
2012/3/21
We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation: $x(N+1+y)+1 quiv 0 mod e...
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Side-Channel Key Recovery Attack
2008/11/14
The fair evaluation and comparison of side-channel attacks
and countermeasures has been a long standing open question, limiting
further developments in the field. Motivated by this challenge, this w...