搜索结果: 1-9 共查到“军事学 word”相关记录9条 . 查询时间(0.078 秒)
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Automatic search Division property ARX
2017/9/13
Division property is a generalized integral property proposed by Todo at Eurocrypt 2015. Previous tools for automatic searching are mainly based on the Mixed Integer Linear Programming (MILP) method a...
Secure Channels and Termination: The Last Word on TLS
Secure channels stateful length-hiding authenticated encryption (stLHAE) authenticated encryption with associated data (AEAD)
2017/8/21
Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channe...
Privacy preserving delegated word search in the cloud
Privacy preserving keyword search delegation cloud
2016/1/8
In this paper, we address the problem of privacy preserving delegated
word search in the cloud. We consider a scenario where a data owner outsources
its data to a cloud server and delegates the sear...
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
word problem subgroup membership problem Mihailova subgroup
2016/1/8
A presentation of a group with two generators having unsolvable word problem and an
explicit countable presentation of Mihailova subgroup of F2 × F2 with finite number of generators are
given. Where...
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
stream ciphers algebraic attacks Welch-Gong
2015/12/30
In this paper we investigate univariate algebraic attacks on
filter generators over extension fields Fq = F2n with focus on the WelchGong
(WG) family of stream ciphers. Our main contribution is to b...
An Investigation of Complex Operations with Word-Size Homomorphic Encryption
Homomorphic encryption word-size comparison
2015/12/18
Homomorphic encryption has progressed rapidly in both effi-
ciency and versatility since its emergence in 2009. Meanwhile, a multitude
of pressing privacy needs ?ranging from cloud computing to heal...
Entity Authentication Schemes Using Braid Word Reduction
braid group authentication zero knowledge handle reduction
2009/4/15
Artin’s braid groups currently provide a promising background for cryptographical
applications, since the first cryptosystems using braids were introduced in
[2, 3, 18] (see also [22]). A variety of...
In this report, we point out a serious security flaw in Microsoft
Word and Excel. The stream cipher RC4 [9] with key length up
to 128 bits is used in MicrosoftWord and Excel to protect the documents...
MV3: A new word based stream cipher using rapid mixing and revolving buffers
stream cipher random walks expander graph
2008/12/22
mv3 is a new word based stream cipher for encrypting long
streams of data. A direct adaptation of a byte based cipher such as rc4
into a 32- or 64-bit word version will obviously need vast amounts o...