搜索结果: 1-15 共查到“generator”相关记录121条 . 查询时间(0.123 秒)
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Modular inversion hidden number problem inversive congruential generator lattice
2019/6/3
The Modular Inversion Hidden Number Problem (MIHNP), introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001, is briefly described as follows: Let MSBδ(z)MSBδ(z) refer to the δδ most signifi...
On the Concrete Security of Goldreich’s Pseudorandom Generator
Pseudorandom generators Algebraic attacks Guess-and-Determine
2018/12/3
Local pseudorandom generators allow to expand a short random string into a long pseudo-random string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficie...
Registration-Based Encryption: Removing Private-Key Generator from IBE
identity-based encryption key escrow
2018/11/8
In this work, we introduce the notion of registration-based encryption (RBE for short) with the goal of removing the trust parties need to place in the private-key generator in an IBE scheme. In an RB...
Randomness analysis for multiple-recursive matrix generator
Linear feedback shift register stream cipher randomness
2018/6/19
Randomness testing of binary sequences generated by any keystream generator is of paramount importance to both designer and attacker. Here we consider a word-oriented keystream generator known as mult...
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
post-quantum cryptography code-based cryptography Niederreiter key generation
2017/6/22
This paper presents an post-quantum secure, efficient, and tunable FPGA implementation of the key generation algorithm for the Niederreiter cryptosystem using binary Goppa codes. Our key generator imp...
大连理工大学嵌入式SoC系统设计课件第七章 基于System Generator的DSP系统开发技术
大连理工大学 嵌入式SoC系统设计 课件 第七章 基于System Generator的DSP系统开发技术
2017/4/6
大连理工大学嵌入式SoC系统设计课件第七章基于System Generator的DSP系统开发技术。
We show that this is indeed possible: we give a candidate predicate for Goldreich's PRG with DT-complexity 44 and QQ-degree 33; in particular, this candidate PRG therefore has the property that every ...
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
Principal Ideal Problem cryptanalysis FHE
2017/2/21
The Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as PIP (resp. SPIP), consists in finding a generator (resp. short generator) of a principal ideal in the ring of integers of ...
Computing generator in cyclotomic integer rings
Principal Ideal Problem lattices Post-Quantum
2016/12/8
The Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as PIP (resp. SPIP), consists in finding a generator (resp. short generator) of a principal ideal in the ring of integers of ...
In the crypto community, it is widely acknowledged that any cryptographic scheme that is built with no countermeasure against side-channel analysis (SCA) can be easily broken. In this paper, we challe...
CC-Modeler: A topology generator for 3-D city models
3-D City models topology generator building reconstruction visualization
2016/5/20
In this paper, we introduce a semi-automated topology generator for 3-D objects, CC-Modeler (CyberCity Modeler).Given the data as point clouds measured on Analytical Plotters or Digital Stations, we p...
In this work we demonstrate various weaknesses of the random
number generator (RNG) in the OpenSSL cryptographic library. We
show how OpenSSL’s RNG, knowingly in a low entropy state, potentially
le...
Pseudorandom Generator Based on Hard Lattice Problem
hard lattice problems pseudorandom generator
2016/1/26
We use a variation of the classical hard problem \emph{Inhomogeneous Small Integer Solution} ISIS of lattice, say \emph{Inhomogeneous Subset Sum Solution} ISSS. ISSS itself is a hash function. Proving...
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
constant-round cryptographic protocols multi-party computation pseudo-random generator
2016/1/26
We present a pseudo-random bit generator expanding a uniformly random bitstring
r of length k/2, where k is the security parameter, into a pseudo-random bit-string
of length 2k − log2
(k) usi...
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Modular Inversion Hidden Number Problem Inversive Congruential Generator
2016/1/6
In this paper we revisit the modular inversion hidden number
problem and the inversive congruential pseudo random number generator
and consider how to more efficiently attack them in terms of fewer
...