搜索结果: 1-8 共查到“军事学 elimination”相关记录8条 . 查询时间(0.031 秒)
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
multiparty computation privacy-preserving machine learning secure ridge regression
2019/7/8
In this paper we present a practical protocol for secure ridge regression. We develop the necessary secure linear algebra tools, using only basic arithmetic over prime fields. In particular, we will s...
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
secure linear algebra multiparty computation
2018/8/2
Cramer and Damgård were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For mm linear equ...
A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms
Discrete Logarithm Algorithms discrete logarithm problem
2018/5/14
we revisit the ZigZag strategy of Granger, Kleinjung and Zumbrägel. In particular, we provide a new algorithm and proof for the so-called degree 2 elimination step. This allows us to provide a st...
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
foundations obfuscation
2016/1/23
We revisit the question of constructing secure general-purpose indistinguishability obfuscation (iO), with a security reduction based on explicit computational assumptions over multilinear maps. Pre...
Practical realisation and elimination of an ECC-related software bug attack
elliptic curve OpenSSL NIST fault attack bug attack
2012/6/14
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) pri...
Practical realisation and elimination of an ECC-related software bug attack
cryptographic protocols / elliptic curve OpenSSL NIST fault attack bug attack
2012/3/22
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) pri...
Practical realisation and elimination of an ECC-related software bug attack
cryptographic protocols / elliptic curve OpenSSL NIST fault attack bug attack
2012/3/21
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) pri...
Euclid’s Algorithm, Guass’Elimination and Buchberger’s Algorithm
Euclid’s algorithm Guass’elimination multivariate polynomial
2009/6/12
As we know, Euclid’s algorithm, Guass’ elimination and Buchberger’s algorithm play
important roles in algorithmic number theory, symbolic computation and cryptography even in
science and engineering...