搜索结果: 1-11 共查到“知识库 军事学 e-tools”相关记录11条 . 查询时间(0.046 秒)
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering
Reverse-engineering Vector space search BCT
2019/5/21
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). Unfortunately, some algorithm designers exploit this fact to avoid providing the algorit...
Back to Massey: Impressively fast, scalable and tight security evaluation tools
side-channel attacks guessing entropy bounds
2017/6/28
None of the existing rank estimation algorithms can scale to large cryptographic keys, such as 4096-bit (512 bytes) RSA keys. In this paper, we present the first solution to estimate the guessing entr...
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Practical Post-Quantum Cryptography Lattice Cryptography Ring-LWE
2016/12/7
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this w...
New Tools for Multi-Party Computation
lattice-based cryptography electronic voting learning with errors
2016/5/3
In this work we extend the electronic voting scheme introduced by R. Cramer, R. Gennaro and B. Schoenmakers in [CGS97]. In the original paper the privacy of votes is based on the decisional Diffie-Hel...
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
QA-NIZK Arguments Asymmetric Groups
2015/12/23
SIMON and SPECK family ciphers have attracted the attention of cryptographers all over the world since proposed by NSA in June, 2013. At CHES 2015, Simeck, a new block cipher inspired from both SIMON ...
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
Access control electronic lock
2014/3/7
We examine the widespread SimonsVoss digital locking system 3060 G2 that relies on an undisclosed, proprietary protocol to mutually authenticate transponders and locks. For assessing the security of t...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Reconfigurable Video Coding (RVC) dataflow programming reconfigurability
2012/6/14
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Simulating Features of Composite Prime Order
2012/3/26
In this paper, we explore a general methodology for converting composite order pairing-based cryptosystems into the prime order setting. We employ the dual pairing vector space approach initiated by O...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Crypto Tools Library (CTL) Reconfigurable Video Coding (RVC) dataflow programming reconfigurability platform independence multi-core.
2012/3/20
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Reconfigurable Video Coding (RVC) dataflow programming reconfigurability
2012/8/28
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
Provably Secure Subsitution of Cryptographic Tools
secure substitution proof techniques simulation proof protocols
2008/10/17
Many cryptographic protocols secure against malicious players use specially designed cryptographic
tools. Essentially, these special tools function much like less-expensive tools, but give extra ‘pow...