搜索结果: 1-15 共查到“知识库 军事学 Paper”相关记录17条 . 查询时间(0.078 秒)
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Bitcoin blockchain consensus
2018/1/27
The loosely defined terms hard fork and soft fork have established themselves as descriptors of different classes of upgrade mechanisms for the underlying consensus rules of (proof-of-work) blockchain...
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
conditionally secure secret sharing secrecy computation
2017/7/28
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1. This ...
Pen and Paper Arguments for SIMON and SIMON-like Designs
SIMON Simeck differential cryptanalysis
2016/6/27
In this work, we analyze the resistance of \textsc{Simon}-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a \textsc{Simon...
How to manipulate curve standards: a white paper for the black hat
Elliptic-curve cryptography verifiably random curves verifiably pseudorandom curves
2016/1/8
This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vul...
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
Paper ballot Paper PUF Voting Integrity
2016/1/6
Abstract—Voting systems based on paper ballots has a long history with various problems. Vote-selling and correct outcome are two major problems among many. In this work, we propose a new solution to ...
The mission of theoretical cryptography is to define and construct provably secure cryptographic protocols and schemes. Without proofs of security, cryptographic constructs offer no guarantees whatsoe...
An appendix for a recent paper of Kim
discrete logarithm problem number field sieve pairings
2015/12/21
This note can be seen as an appendix of a recent paper of
Kim [Kim15]. We show that the discrete logarithm problem in fields FQ
where Q = p
n with p of medium size and n having a factor of the good...
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
traffic analysis encrypted containers
2014/3/11
This paper explores ways of performing commutative tasks by $N$ parties. Tasks are defined as {\sl commutative} if the order at which parties perform tasks can be freely changed without affecting the ...
Abstract: We present a paper-based voting method that attempts to achieve the privacy of voters and election universal verifiability and integrity with only paper ballots and without using any cryptog...
Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors)
secure message transmission privacy and reliability Guessing Attack
2009/12/29
In the context of secure point-to-point message transmission in networks with minimal
connectivity, previous studies showed that feedbacks from the receiver to the sender can be used to
reduce the r...
We propose several variants of a secure multiparty computation protocol for AES encryp-
tion. The best variant requires 2200+ 400
255 expected elementary operations in expected 70+ 20
255 rounds
t...
Concrete Security for Entity Recognition:The Jane Doe Protocol(Full Paper)
Concrete Security Entity Recognition Jane Doe Protocol
2009/6/12
Entity recognition does not ask whether the message is from
some entity X, just whether a message is from the same entity as a previous
message. This turns turns out to be very useful for low-end de...
Embedding in Two Least Significant Bits with Wet Paper Coding
Two Least Significant Bits Wet Paper Coding steganalytic attacks
2009/6/5
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are inspired by the work of...
Council for Canadian Security in the 21st Century, To Secure a Nation: The Case for a New Defence White Paper
Council for Canadian Security 21st Century New Defence White Paper
2009/3/11
To Secure a Nation, the recent report of the Council for Canadian Security in the 21st Century (CCS 21), seeks to initiate a long overdue review of Canada 抯 defence and security policy.[1] However th...