搜索结果: 1-9 共查到“军事学 logs”相关记录9条 . 查询时间(0.012 秒)
Forward Integrity and Crash Recovery for Secure Logs
cryptographic protocols computer systems
2019/5/21
Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering ...
Transparency Logs via Append-only Authenticated Dictionaries
implementation key management public-key cryptography
2018/8/6
Transparency logs allow users to audit a potentially malicious service, paving the way towards a more accountable Internet. For example, Certificate Transparency (CT) enables domain owners to audit Ce...
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
discrete logarithm problem diffie-hellman small subgroup attack
2016/12/8
Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parame...
Log files are the primary source of information when the
past operation of a computing system needs to be determined. Keeping
correct and accurate log files is important for after-the-fact forensics...
Efficient Record-Level Keyless Signatures for Audit Logs
applied security secure logging keyless signatures
2016/1/8
We propose a log signing scheme that enables (a) verification of the integrity of the whole log, and
(b) presentation of any record, along with a compact proof that the record has not been altered si...
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
public-key cryptography elliptic curve
2016/1/6
Using the Pohlig–Hellman algorithm, den Boer reduced the discrete logarithm problem
to the Diffie–Hellman problem in groups of an order whose prime factors were each
one plus a smooth number. This r...
Experiments in Encrypted and Searchable Network Audit Logs
network telemetry identity based encryption audit log privacy
2016/1/5
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. E...
Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince
Collision-based attacks discrete-log
2014/3/6
In this paper, we investigate the multi-user setting both in public-key and in secret-key cryptanalytic applications. In this setting, the adversary tries to recover keys of many users in parallel mor...
Logcrypt:Forward Security and Public Verification for Secure Audit Logs
Logcrypt Forward Security Public Verification Secure Audit Logs
2009/1/12
Logcrypt provides strong cryptographic assurances
that data stored by a logging facility before a system
compromise cannot be modified after the compromise
without detection. We build on prior work...