搜索结果: 1-6 共查到“军事学 Reuse”相关记录6条 . 查询时间(0.015 秒)
In 1998, Jerey Hostein, Jill Pipher, and Joseph H. Silverman introduced the famous Ntru cryptosystem, and called it "A ring-based public key cryptosystem". Actually it turns out to be a lattice based ...
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Key-reuse APIs Diffie-Hellman EdDSA
2019/5/21
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
LWE RLWE KEM
2019/3/13
In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a K...
Assessment of the Key-Reuse Resilience of NewHope
Post-quantum cryptography lattice based cryptography active attack
2019/1/26
NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. In this p...
Cryptanalysis of ring-LWE based key exchange with key share reuse
lattice techniques LWE ring LWE
2016/2/23
This paper shows how several ring-LWE based key exchange protocols can be
broken, under the assumption that the same key share is used for multiple
exchanges. This indicates that, if these key excha...
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Authenticated encryption CAESAR competition misuse resistance
2016/1/3
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann,
Forler, and Lucks (2012). It has become a popular definitional target because, despite allowing encrypti...