搜索结果: 1-7 共查到“军事学 isolated”相关记录7条 . 查询时间(0.312 秒)
We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman-Horn conje...
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
elliptic curve cryptosystem number theory
2017/5/5
We call a simple abelian variety over FpFp super-isolated if its (FpFp-rational) isogeny class contains no other varieties. The motivation for considering these varieties comes from concerns about iso...
Symbolic Models for Isolated Execution Environments
isolated execution environments trusted hardware symbolic models
2017/2/20
Isolated Execution Environments (IEEs), such as ARM TrustZone and Intel SGX, offer the possibility to execute sensitive code in isolation from other malicious programs, running on the same machine, or...
Isolated Execution on Many-core Architectures
many-core systems hardware security architecture
2016/1/25
We explore how many-core platforms can be used to enhance the security of future systems and to support important security
properties such as runtime isolation using a small Trusted Computing Base (T...
Single-shot security for one-time memories in the isolated qubits model
Quantum cryptography information theory
2016/1/9
One-time memories (OTM’s) are simple, tamper-resistant
cryptographic devices, which can be used to implement sophisticated
functionalities such as one-time programs. Can one construct OTM’s
whose s...
Isolated Proofs of Knowledge and Isolated Zero Knowledge
IPoK Isolated Zero Knowledge cheating prover
2008/5/29
We introduce a new notion called `-isolated proofs of knowledge (`-IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to ` bits of communication with some external...
Universally Composable Multiparty Computation with Partially Isolated Parties
universally composable security public-key infrastructure standard model
2008/5/29
It is well known that universally composable multiparty computation cannot, in general,be achieved in the standard model without setup assumptions when the adversary can corrupt an arbitrary number of...