搜索结果: 1-11 共查到“军事学 Bias”相关记录11条 . 查询时间(0.085 秒)
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Side-channel analysis Machine learning Deep learning
2019/5/28
Machine learning techniques represent a powerful option in profiling side-channel analysis. Still, there are many settings where their performance is far from expected. In such occasions, it is very i...
Linear Cryptanalysis Using Low-bias Linear Approximations
Linear cryptanalysis Multiple linear cryptanalysis Multi-key linear cryptanalysis
2017/3/6
This paper deals with linear approximations having absolute bias smaller than 2−n22−n2 which were previously believed to be unusable for a linear attack. We show how a series of observatio...
Scalable Bias-Resistant Distributed Randomness
public randomness collective signing secret sharing
2016/12/7
Bias-resistant public randomness is a critical component required in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries behave dishonestly in order...
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
(Sparse) Walsh-Hadamard Transform Linear cryptanalysis Bias analysis
2016/5/3
Walsh-Hadamard transform is used in a wide variety of scientific and engineering applications, including bent functions and cryptanalytic optimization techniques in cryptography. In linear cryptanalys...
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants
Architectural bias arbiter PUF (APUF) double APUF (DAPUF)
2016/1/27
This paper introduces the notion of Architectural Bias, which can be used to measure the influence of the architecture of Arbiter Physically Unclonable Functions (APUFs) on the quality of its outputs....
Achieving Differential Privacy with Bias-Control Limited Source
differential privacy imperfect randomness Bias-Control Limited source
2015/12/31
In the design of differentially private mechanisms, it’s usually
assumed that a uniformly random source is available. However, in many
situations it seems unrealistic, and one must deal with various...
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
traitor tracing
2014/3/5
We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distributi...
Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for secure key storage and anti-counterfeiting. For both applications it is imperative that PUFs provide ...
A Dichotomy for Local Small-Bias Generators
foundations / small-bias generator dichotomy local functions NC0 pseudo-randomness
2012/3/26
We consider pseudorandom generators in which each output bit depends on a constant number of input bits. Such generators have appealingly simple structure: they can be described by a sparse input-outp...
Bias in the nonlinear filter generator output sequence
Bias nonlinear filter generator output sequence
2010/3/16
Nonlinear filter generators are common components used in
the keystream generators for stream ciphers and more recently for authentication
mechanisms. They consist of a Linear Feedback Shift Registe...
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Bias Cryptanalysis Keystream Key Leakage RC4 Stream Cipher
2008/8/18
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key
Scheduling Algorithm (KSA) of RC4, the initial bytes of the permutation, i.e., S[y]
for small values of y are biased to...