搜索结果: 1-15 共查到“军事学 T-test”相关记录29条 . 查询时间(0.034 秒)
In this paper we present our observations about NIST's Compression estimate test given in SP-800 90B. We observe that steps 4 and 7 of the test may be re-framed to gain efficiency. Based on our observ...
An Efficient and Compact Reformulation of NIST Collision Estimate Test
IID Non-IID Min Entropy
2019/5/14
In this paper we give an efficient and compact reformulation of NIST collision estimate test given in SP-800 90B. We correct an error in the formulation of the test and show that the test statistic ca...
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Attribute-Based Encryption Authorization Classification
2018/11/5
Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data ...
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Controlled-NOT function can provoke biased interpretation from Bell's test experiments
cryptografic protocol cnot gate Bell test
2017/7/19
Recently, we showed that the controlled-NOT function is a permutation that cannot be inverted in subexponential time in the worst case [Quantum Information Processing. 16:149 (2017)]. Here, we show th...
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
PUF APUF
2017/5/27
Unpredictability is an important security property of Physically Unclonable Function (PUF) in the context of statistical attacks, where the correlation between challenge-response pairs is explicitly e...
Public Key Encryption with Equality Test in the Standard Model
Public key encryption with equality test identity-based encryption with equality test standard model
2017/1/3
Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users UiUi to perform equality tests on ciphertexts encrypted using publ...
Certificateless Public Key Encryption with Equality Test
certificateless public key encryption public key encryption equality test
2016/12/12
In this paper, we propose the concept of certificateless public key encryption with equality test (CL-PKEET) to solve the key escrow problem in IBEET. More in details, we first give the definition of ...
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
multiple linear cryptanalyis LLR statistic chi-squared statistic
2016/4/26
The log-likelihood ratio (LLR) test statistic has been proposed in the literature for performing statistical analysis of attacks on block ciphers. A limitation of the LLR test statistic is that its ap...
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
PKEET public-key cryptography
2016/3/14
In recent years, public key encryption with equality test (PKEET) has become
a hot research topic in the cryptography community due to the advancement of cloud
computing. Recently, Ma et al. propose...
Simpler, Faster, and More Robust T-test Based Leakage Detection
Power analysis Leakage detection T-Test
2016/1/27
The TVLA procedure using the t-test has become a popular
leakage detection method. To protect against environmental fluctuation
in laboratory measurements, we propose a paired t-test to improve
the...
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Hardware Trojans Genetic Algorithm Boolean Satisfiability
2016/1/26
Test generation for Hardware Trojan Horses (HTH) detection
is extremely challenging, as Trojans are designed to be triggered by
very rare logic conditions at internal nodes of the circuit. In this p...
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Randomness test Statistical indices RC4 key scheduling
2016/1/9
In this paper, we introduce the concept of the derivative of sequence of numbers and define
new statistical indices by which we discoverd new properties of randomly generated number
sequences. We al...
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
Logic Built-In Self-Test hardware Trojans M2M
2016/1/3
A rapid growth of Machine-to-Machine (M2M) communications is expected in the coming years. M2M applications create new challenges for in-field testing since they typically operate in environments wher...
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...