搜索结果: 1-7 共查到“军事学 effective”相关记录7条 . 查询时间(0.116 秒)
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Zero-Leakage Information Hiding Winnowing
2019/5/27
How much we say, to whom, and when, is inherently telling, even if the contents of our communication is unclear. In other words: encryption is not enough; neither to secure privacy, nor to maintain co...
Cost effective techniques for chip delayering and in-situ depackaging
package removal delayering decapsulation
2019/3/20
Invasive or semi-invasive attacks require, of course, because of their nature, the removal of metal layers or at least the package de-capsulation of the chip. For many people - not expert in those sam...
Secure and Effective Logic Locking for Machine Learning Applications
Logic Locking SAT Attack Machine Learning Applications
2019/1/9
Logic locking has been proposed as a strong protection of intellectual property (IP) against security threats in the IC supply chain especially when the fabrication facility is untrusted. Various tech...
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
broadcast encryption private linear key agreement traitor tracing
2018/5/28
Private linear key agreement (PLKA) enables a group of users to agree upon a common session key in a broadcast encryption (BE) scenario, while traitor tracing (TT) system allows a tracer to identify c...
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can be seen in open literature. Most of them enhance the secrecy of the cipher and the security levels have been ...
An Effective Method to Implement Group Signature with Revocation
Group signature schemes strong RSA assumption anonymity
2009/3/5
This paper presents an effective method to integrate the revocation mechanism
into some group signature schemes that are based on the strong RSA assumption. The mech-
anism enables the group manager...
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
elliptic curves over extension field effective polynomial family non-supersingular elliptic curves
2009/2/19
Finding suitable non-supersingular elliptic curves becomes an important issue for the
growing area of pairing-based cryptosystems. For this purpose, many methods have
been proposed when embedding de...