搜索结果: 1-15 共查到“resilient”相关记录157条 . 查询时间(0.14 秒)
![](http://www.firstlight.cn/upload/imgfile/20236/8/202368163411406.jpg)
4 Simple Ways to Build Stronger, More Resilient Hamstrings
Sports Injuries Training Muscular Injuries
2024/12/11
Regardless of your sport, without adequate physical preparation, the chance of straining your hamstring remains high during games and practices. With that in mind, here are four ways any athlete can r...
![](http://www.firstlight.cn/upload/imgfile/20236/21/2023621132930524.jpg)
Research collaboration puts climate-resilient crops in sight(图)
气候 作物 植物生物学 机器学习 环境胁迫反应 遗传根源
2023/6/21
![](http://www.firstlight.cn/upload/imgfile/202010/10/20201010103546890.jpg)
Forest margins may be more resilient to climate change than previously thought(图)
Forest margins resilient climate change previously thought
2020/10/10
A warming climate and more frequent wildfires do not necessarily mean the western United States will see the forest loss that many scientists expect.Dry forest margins, areas where forest meets sagebr...
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
public-key cryptography leakage-resilient identity-based encryption
2019/8/30
In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA...
SAT-attack is known to successfully decrypt a functionally correct key of a locked combinational circuit. It is possible to extend the SAT-attack to sequential circuits through the scan-chain by selec...
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
DAO voting functional encryption
2019/6/4
Voting systems are the tool of choice when it comes to settle an agreement of different opinions. We propose a solution for a trustless, censorship-resilient and scalable electronic voting platform. B...
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
public-key encryption leakage-resilience CCA security
2019/5/21
We propose the concept of quasi-adaptive hash proof system (QAHPS), where the projection key is allowed to depend on the specific language for which hash values are computed. We formalize leakage-resi...
In the past 15 years, cryptography has made considerable progress in expanding the adversarial attack model to cover side-channel attacks, and has built schemes to provably defend against some of them...
Lower Bounds for Leakage-Resilient Secret Sharing
Lower Bound Secret Sharing Leakage-Resilience
2019/3/1
Threshold secret sharing allows a dealer to split a secret into nn shares such that any authorized subset of cardinality at least tt of those shares efficiently reveals the secret, while at the same t...
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Authenticated encryption re-keying tweakable block cipher
2019/2/26
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers asymptotically optimal s...
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Leakage-resilience Bounded retrieval model Identity-based Encryption
2019/1/26
We propose new constructions of leakage-resilient public-key encryption (PKE) and identity-based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM, adversaries are allowed to o...
Leakage-Resilient Group Signature: Definitions and Constructions
group signature full anonymity full traceability
2019/1/9
Group signature scheme provides group members a way to sign messages without revealing their identities. Anonymity and traceability are two essential properties in a group signature system. However, t...
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Non-malleable secret sharing Leakage-resilient secret sharing Non-malleable extractors
2018/12/3
In this work we present a collection of compilers that take secret sharing schemes for an arbitrary access structures as input and produce either leakage-resilient or non-malleable secret sharing sche...
A secret sharing scheme allows a dealer to share a secret among a set of nn parties such that any authorized subset of the parties can recover the secret, while any unauthorized subset of the parties ...