搜索结果: 1-11 共查到“军事学 Regular”相关记录11条 . 查询时间(0.046 秒)
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
side-channel analysis Montgomery modular multiplication extra-reduction leakage
2016/6/8
Walter & Thomson (CT-RSA '01) and Schindler (PKC '02) have shown that extra-reductions allow to break RSA-CRT even with message blinding. Indeed, the extra-reduction probability depends on the type of...
Side-Channel Analysis on Blinded Regular Scalar Multiplications
Elliptic curves Scalar multiplication Side-channel analysis
2016/1/25
We present a new side-channel attack path threatening state-of-the-art protected implementations of elliptic curves embedded scalar multiplications. Regular algorithms such as the double-and-add-alway...
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Universal One-way Hash Functions One-way functions Randomized Iterate
2016/1/9
We revisit the problem of black-box constructions of universal one-way hash functions (UOWHFs)
from several (from specific to more general) classes of one-way functions (OWFs), and give respective
c...
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
symmetric functional encryption deterministic finite automaton regular language
2016/1/9
We present a symmetric-key predicate-only functional encryption
system, SP-FE, which supports functionality for regular languages
described by deterministic finite automata. In SP-FE, a data
owner ...
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Dual system encryption Functional encryption for regular languages Attribute-based encryption
2016/1/9
Dual system encryption techniques introduced by Waters in Crypto’09 are powerful approaches
for constructing fully secure functional encryption (FE) for many predicates. However,
there are still som...
Linear codes with few weights from weakly regular bent functions based on a generic construction
Linear codes weight distribution p-ary functions
2015/12/21
We contribute to the knowledge of linear codes with few weights from special polynomials
and functions. Substantial efforts (especially due to C. Ding) have been directed
towards their study in the ...
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
one-way functions pseudorandom generators
2013/9/18
We revisit the problem of basing pseudorandom generators on regular one-way functions, and present the following constructions:
(1) For any known-regular one-way function (on $n$-bit inputs) that is ...
Elliptic curve cryptosystems are more and more widespread in everyday-life applications. This trend should still gain momentum in coming years thanks to the exponential security enjoyed by these syste...
Elliptic curve cryptosystems are more and more widespread in everyday-life applications. This trend should still gain momentum in coming years thanks to the exponential security enjoyed by these syste...
Faster 2-regular information-set decoding
Information-set decoding 2-regular decoding FSB binary
2011/3/11
Fix positive integers B and w. Let C be a linear code over F2
of length Bw. The 2-regular-decoding problem is to find a nonzero codeword
consisting of w length-B blocks, each of which has Hamming we...
Faster 2-regular information-set decoding
secret-key cryptography / Information-set decoding 2-regular decoding FSB binary codes
2011/3/9
Fix positive integers B and w. Let C be a linear code over F_2 of length Bw. The 2-regular-decoding problem is to find a nonzero codeword consisting of w length-B blocks, each of which has Hammi...