搜索结果: 1-15 共查到“军事学 results”相关记录68条 . 查询时间(0.048 秒)
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Modular inversion hidden number problem inversive congruential generator lattice
2019/6/3
The Modular Inversion Hidden Number Problem (MIHNP), introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001, is briefly described as follows: Let MSBδ(z)MSBδ(z) refer to the δδ most signifi...
Computational Limitations in Robust Classification and Win-Win Results
Robust Classification Learning Parity with Noise
2019/2/28
We continue the study of statistical/computational tradeoffs in learning robust classifiers, following the recent work of Bubeck, Lee, Price and Razenshteyn who showed examples of classification tasks...
New Results about the Boomerang Uniformity of Permutation Polynomials
Finite Field Boomerang Connectivity Table Boomerang Uniformity
2019/1/29
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: Boomerang Connectivity Table (BCT for short) for evaluating the subtleties of boomerang-style attacks. ...
Improved Results on Factoring General RSA Moduli with Known Bits
Factorization General RSA moduli Known bits Integer method
2018/6/25
We revisit the factoring with known bits problem on general RSA moduli in the forms of N=prqsN=prqs for r,s≥1r,s≥1, where two primes pp and qq are of the same bit-size. The relevant moduli are inclusi...
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions
Leakage-resilience authenticated encryption leveled implementations
2018/5/28
We propose definitions and constructions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of side-channel leakages and nonce misuse. This is part of an impo...
Risky Traitor Tracing and New Differential Privacy Negative Results
Traitor Tracing Differential Privacy
2017/11/27
Finally, we can capture impossibility results for differential privacy from risky traitor tracing. Since our ciphertexts are short (O(λ)O(λ)), thus we get the negative result which matches what one wo...
Overcoming Cryptographic Impossibility Results using Blockchains
Blockchain Bitcoin Ethereum
2017/9/26
Blockchain technology has the potential to disrupt how cryptography is done. In this work, we propose to view blockchains as an "enabler", much like indistinguishability obfuscation (Barak et al., CRY...
New security notions and feasibility results for authentication of quantum data
Quantum message authentication Wegman-Carter authentication scheme Unitary designs
2017/6/9
We give a new class of security definitions for authentication in the quantum setting. These definitions capture and strengthen existing definitions of security against quantum adversaries for both cl...
The pseudorandom-function oracle-Diffie–Hellman (PRF-ODH) assumption has been introduced recently to analyze a variety of DH-based key exchange protocols, including TLS 1.2 and the TLS 1.3 candidates,...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120 bit S...
Some results on the existence of tt-all-or-nothing transforms over arbitrary alphabets
foundations combinatorial cryptography
2017/2/28
A (t,s,v)(t,s,v)-all-or-nothing transform is a bijective mapping defined on ss-tuples over an alphabet of size vv, which satisfies the condition that the values of any tt input co-ordinates are comple...
Some Results on the Known Classes of Quadratic APN Functions
APN function quadratic function Walsh spectrum
2017/1/3
In this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by G\"olo\u glu is affine equival...
Some results on ACORN
CAESAR ACORN linear approximation
2016/12/12
In this paper we obtain a weakness in the design specification of ACORN, which is a competitor of CAESAR competition. We show that there exists a probabilistic linear relation between message bits and...
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs
Physically uncloneable functions UC security hardware setup assumptions
2016/6/22
Brzuska \etal. (Crypto 2011) proved that unconditional UC-secure computation is possible if parties have access to honestly generated physically unclonable functions (PUFs). Dachman-Soled \etal. (Cryp...
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Backdoor Surveillance PRNG with input
2016/6/6
Inspired by the Dual EC DBRG incident, Dodis et al. (Eurocrypt
2015) initiated the formal study of backdoored PRGs, showing
that backdoored PRGs are equivalent to public key encryption schemes,
giv...