搜索结果: 1-15 共查到“军队指挥学 CPA”相关记录17条 . 查询时间(0.013 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
CPA-to-CCA Transformation for KDM Security
public-key encryption key-dependent message security chosen ciphertext security
2019/6/3
We show that chosen plaintext attacks (CPA) security is equivalent to chosen ciphertext attacks (CCA) security for key-dependent message (KDM) security. Concretely, we show how to construct a public-k...
A remark on a success rate model fpr DPA and CPA
Side-channel attacks evaluation metric success rate
2018/11/16
The success rate is the most common evaluation metric for measuring the performance of a particular side channel attack scenario. We improve on an analytic formula for the success rate.
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
CPA-secure encryption CCA-secure KEM
2018/3/5
In this paper, we introduce Saber, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first describe a secure Diffie...
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
Lattices-based Post-quantum Cryptography NTRUEncrypt NTRU-Prime
2018/1/31
In this paper, we propose NTRU-LPR IND-CPA, a new secure scheme based on the decisional variant of Bounded Distance Decoding problem over rings (DR-BDD). This scheme is IND-CPA secure and has two KEM ...
What about Bob? The Inadequacy of CPA Security for Proxy Reencryption
reencryption chosen plaintext security definitions
2017/8/21
Consider three parties: Alice, Bob, and Polly. Alice keeps some encrypted data that she can decrypt with a secret key known to her. She wants to communicate the data to Bob, but not to Polly (nor anyb...
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
After-the-Fact leakage bounded memory leakage split-state
2017/5/25
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these a...
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Circular Security every IND-CPA cryptosystem
2017/2/20
One interesting question is whether circular security comes for free from IND-CPA security. Recent works have addressed this question, showing that for all integers n, there exists an IND-CPA scheme t...
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
Public Key Encryption randomized algorithms
2016/6/2
We describe a general technique to protect randomized algorithms against kleptographic attacks. We then apply the technique to construct the first IND-CPA secure public-key encryp- tion scheme in the ...
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
predicate key encapsulation mechanism chosen-ciphertext security
2016/1/8
We present a new transformation of chosen-plaintext secure predicate encryption schemes
with public index into chosen-ciphertext secure schemes. Our construction requires only a universal
one-way ha...
Analysis Of Variance and CPA in SCA
SCA AOV CPA
2016/1/7
This paper introduces Side-Channel Analysis results obtained on an unprotected circuit characterized by a surprisingly non-linear leakage. While in such a case, Correlation Power Analysis is not adapt...
Generic Conversions from CPA to CCA secure Functional Encryption
Functional encryption Predicate encryption Delegation
2015/12/30
In 2004, Canetti-Halevi-Katz and later Boneh-Katz showed
generic CCA-secure PKE constructions from a CPA-secure IBE. Goyal
et al. in 2006 further extended the aforementioned idea implicitly to provi...
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Circular Security Related Key Attack Obfuscation
2014/3/6
Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security the adversary is given an extra ``hint'' consisting of...
On the Resilience and Uniqueness of CPA for Secure Broadcast
ad hoc networks secure broadcast
2014/3/6
We consider the Secure Broadcast problem in incomplete networks. We study the resilience of the Certified Propagation Algorithm (CPA), which is particularly suitable for ad hoc networks. We address th...
A Frequency Leakage Model and its application to CPA and DPA
Leakage Model Frequency Domain
2014/3/13
This paper introduces a leakage model in the frequency domain to enhance the efficiency of Side Channel Attacks of CMOS circuits. While usual techniques are focused on noise removal around clock harmo...