搜索结果: 1-8 共查到“军事学 stochastic”相关记录8条 . 查询时间(0.125 秒)
We introduce stochastic sandpile models which imitate numerous aspects of the practical behavior of the LLL algorithm with compelling accuracy. In addition, we argue that the physics and mathematics o...
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
side-channel attacks template attack stochastic model
2016/1/6
Template attacks and stochastic models are among the most
powerful side-channel attacks. However, they can be computationally
expensive when processing a large number of samples. Various compression...
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Side-channel leak web application suggest box
2016/1/5
Web applications are subject to several types of attacks. In
particular, side-channel attacks consist in performing a statistical analysis
of the web traffic to gain sensitive information about a cl...
A Physical Approach for Stochastic Modeling of TERO-based TRNG
hardware random number generators transition effect ring oscillator
2015/12/29
Security in random number generation for cryptography is closely related
to the entropy rate at the generator output. This rate has to be evaluated
using an appropriate stochastic model. The stochas...
On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
pseudorandomness
2014/3/11
Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and symmetric key block ciphers (e.g., AES and TDES) have been commonly used to design pseudorandom generators with ...
Computing Almost Exact Probabilities of Diferential Hash Collision Paths by Applying Appropriate Stochastic Methods
Hash function collision path postaddition
2009/6/2
Generally speaking, the probability of a differential path determines
an upper bound for the expected workload and thus for the
true risk potential of a dierential attack. In particular, if the exp...
Secure Stochastic Multi-party Computation for Combinatorial Problems and A Privacy Concept
Secure Stochastic Multi-party Computation Combinatorial Problems Privacy Concept
2009/2/8
High levels of security often imply that the computation time should be independent
of the value of involved secrets. When the expected answer of the solver
is either a solution or unsatisable, the...
Computational Semantics for Basic Protocol Logic –A Stochastic Approach
cryptographic protocols formal methods first order logic
2008/9/1
This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first order logic.We first argue that th...