搜索结果: 1-15 共查到“军事学 Distribution”相关记录51条 . 查询时间(0.468 秒)
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Jacobi symbol probability distribution statistical distance
2019/6/4
We develop exact formulas for the distribution of quadratic residues and non-residues in sets of the form a+X={(a+x)modn∣x∈X}a+X={(a+x)modn∣x∈X}, where nn is a prime or the product of two primes and X...
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Encrypted Database Attack Range Query
2019/5/5
Recent foundational work on leakage-based attacks on encrypted databases has broadened our understanding of what an adversary can accomplish with a standard leakage profile. Nevertheless, all known va...
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-bo...
Two Party Distribution Testing: Communication and Security
foundations secure computation distribution testing
2018/11/12
We study the problem of discrete distribution testing in the two-party setting. For example, in the standard closeness testing problem, Alice and Bob each have tt samples from, respectively, distribut...
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers
lattice-based cryptography discrete Gaussian sampling rejection sampling
2017/10/12
Lattice-based cryptography has been accepted as a promising candidate for public key cryptography in the age of quantum computing. Discrete Gaussian sampling is one of fundamental operations in many l...
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
Poker Multiparty Computation Blockchain
2017/9/25
The research on secure poker protocols without trusted intermediaries has a long history that dates back to modern cryptography's infancy. Two main challenges towards bringing it into real-life are en...
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication
Secure sketches typo-tolerant password authentication
2017/6/9
Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We re...
A Quantum Attack on LWE with Arbitrary Error Distribution
Lattice-based cryptography LWE quantum attack
2017/3/6
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parameter sets aiming for concrete post-quantum security levels. Security evaluations of such schemes need...
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
multi-cast key distribution exposure resilience star topology
2016/12/10
In this paper, we propose a two-round dynamic multi-cast key distribution (DMKD) protocol under the star topology with a central authentication server. Users can share a common session key without rev...
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
side channel evaluations key rank
2016/5/23
Quantifying the side channel security of implementations has been a significant research question for several years in academia but also among real world side channel practitioners. As part of securit...
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
lightweight cryptography finite field multiplication basis of finite field
2016/5/3
In this paper, we study the behavior of the XOR count distributions under different bases of finite field. XOR count of a field element is a simplified metric to estimate the hardware implementation c...
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography conjugate coding quantum money
2016/1/26
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is
quantum key dist...
The Uniform Distribution of Sequences Generated by Iteration of Polynomials
pseudo-randomness polynomial PRNG uniform distribution
2015/12/31
Consider a collection f of polynomials fi(x), i=1,…,s, with integer coefficients such that polynomials fi(x)−fi(0), i=1,…,s, are linearly independent. Denote by Dm the discrepancy for the set of...