搜索结果: 1-15 共查到“军事学 algebra”相关记录18条 . 查询时间(0.109 秒)
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also code-b...
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
secure linear algebra multiparty computation
2018/8/2
Cramer and Damgård were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For mm linear equ...
MRHS Solver Based on Linear Algebra and Exhaustive Search
Algebraic cryptanalysis MRHS LowMC
2018/1/31
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher's resis...
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
post-quantum cryptography multivariate cryptography Groebner basis
2017/6/22
The security of several post-quantum cryptosystems is based on the assumption that solving a system of multivariate (quadratic) polynomial equations p1=⋯=pm=0p1=⋯=pm=0 over a finite field ...
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
secret-key cryptography FHE
2016/1/27
Brakerski showed that linearly decryptable fully homomorphic encryption
(FHE) schemes cannot be secure in the chosen plaintext attack (CPA)
model. In this paper, we show that linearly decryptable FH...
Differentially Private Linear Algebra in the Streaming Model
Differential Privacy Linear Algebra Random Projection
2016/1/7
The focus of this paper is a systematic study of differential privacy on streaming data using sketchbased
algorithms. Previous works, like Dwork et al. (ICS 2010, STOC 2010), explored random sampling...
Analysis of a key exchange protocol based on tropical matrix algebra
Tropical algebra cryptography key-exchange
2015/12/23
In this paper we consider a two party key-exchange protocol
proposed in [4, Section 2] which uses tropical matrix algebra as a
platform. Our analysis shows that the scheme is not secure.
Nearly Sparse Linear Algebra
Sparse Linear Algebra Block Wiedemann Algorithm Discrete Logarithm
2015/12/22
In this article, we propose a method to perform linear algebra
on a matrix with nearly sparse properties. More precisely, although
we require the main part of the matrix to be sparse, we allow some ...
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
Multivariate Quadratic Quaternion Zero Knowledge Proof Authentication
2010/2/20
This paper introduces a new intractable security problem whose
intractability is due to the NP completeness of multivariate quadratic problem. This
novel problem uses quaternion algebra in conjuncti...
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Public Key Cryptography Alternative algebra lattice based cryptography
2009/9/27
In this paper, we show that the fundamental concepts behind the Ntr¹u cryptosystem can
be extended to a broader algebra than Dedekind domains. Also, we present an abstract and
generalized algor...
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Public Key Cryptography Alternative algebra lattice based cryptography
2009/9/22
In this paper, we show that the fundamental concepts behind the Ntr¹u cryptosystem can
be extended to a broader algebra than Dedekind domains. Also, we present an abstract and
generalized algor...
QTRU: A Lattice Attack Resistant Version of NTRU PKCS Based on Quaternion Algebra
QTRU NTRU quaternion algebra
2009/8/18
We propose QTRU, a probabilistic and multi-dimensional public key cryptosystem based on
the NTRU public key cryptosystem using quaternion algebra. QTRU encrypts four data vectors
in each encryption ...