搜索结果: 1-3 共查到“军事学 Constraints”相关记录3条 . 查询时间(0.109 秒)
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Symmetric-key cryptography message authentication code lightweight
2018/4/17
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message int...
Model-counting Approaches For Nonlinear Numerical Constraints
Side-channel Attacks Modulo Exponentiation Quantitative Information Flow
2017/3/21
Model counting is of central importance in quantitative reasoning about systems. Examples include computing the probability that a system successfully accomplishes its task without errors, and measuri...
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Security Constraints Oswald-Aigner Exponentiation Algorithm
2009/4/7
Security Constraints on the Oswald-Aigner Exponentiation Algorithm.