搜索结果: 1-11 共查到“知识库 军事学 Phase I”相关记录11条 . 查询时间(0.039 秒)
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Commitment Universal Composability Global Random Oracle
2019/5/21
We propose a generic framework for perfectly hiding UC-Commitment schemes in the Global Random Oracle model of Canetti \textit{el at.} (CCS 14). The main building block of our construction is a novel ...
We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme. Our proof consists of the following steps. We construct an EPR var...
Multicarrier phase-based ranging is fast emerging as a cost-optimized solution for a wide variety of proximity-based applications due to its low power requirement, low hardware complexity and compatib...
Round-Robin Differential Phase-Shift (RRDPS) is a Quantum Key Distribution (QKD) scheme proposed by Sasaki, Yamamoto and Koashi in 2014. It works with high-dimensional quantum digits (qudits). Its mai...
Decryption phase in Norwegian electronic voting
electronic voting protocols verifiable shuffle
2016/12/8
We describe an efficient and secure decryption protocol to the
Norwegian Internet voting project. We first adapt Groth’s shuffledecryption
from 2010 to our purpose, and we prove all security
proper...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementation flaws, which disclose side-channel information about the secret key. Bernstein's attack is a well...
We calculate the probability of success of block-hiding mining strategies in bitcoin-like networks.
These strategies involve building a secret branch of the block-tree and publishing it
opportunisti...
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
public-key cryptography Lattice-based Xryptography
2016/1/5
In this paper, we propose a new phase-based enumeration algorithm based on two
interesting and useful observations for y-sparse representations of short lattice vectors in lattices
from SVP challeng...
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Authenticated Key Exchange Security Model Security Analysis
2015/12/29
The Trusted Platform Module (TPM) version 2.0 provides an authenticated key exchange
functionality by a single key exchange primitive, which can be called to implement three
key exchange protocols (...
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Phase Shifting Equivalent Keys Exhaustive Search specific ciphers
2009/6/3
Recent articles [6, 3, 5, 7] introduce the concept of phase shifting
equivalent keys in stream ciphers, and exploit this concept in order to
mount attacks on some specic ciphers. The idea behind ph...
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
cryptanalysis equivalent keys stream cipher DECIM v2
2009/6/3
DECIM v2 is a stream cipher submitted to the ECRYPT
stream cipher project (eSTREAM) and ISO/IEC 18033-4. No attack
against DECIM v2 has been proposed yet. In this paper, we propose a
chosen IV atta...