搜索结果: 1-5 共查到“军事学 D-loop”相关记录5条 . 查询时间(0.156 秒)
Loop-abort faults on supersingular isogeny cryptosystems
Supersingular isogeny cryptosystem fault injection real-world attacks
2017/5/2
Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault i...
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash’n Sign signatures
Fault Attacks Digital Signatures Postquantum Cryptography
2016/5/9
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and advisory bodies have started recommending that we prepare the transition away from factoring and discrete ...
Self-loop-based Modification of Smart and Vercauteren’s Fully Homomorphic Encryption
Fully Homomorphic Encryption Polynomial Coset Problem Sparse Subset Sum Problem
2011/3/11
This paper modifies the Smart and Vercauteren’s fully homomorphic encryption scheme [SV10] by applying self-loop bootstrappable technique. The security of the modified scheme only depends on the hardn...
Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves
elliptic curve cryptosystem pairing number theory
2011/2/23
We provide a simple and exact formula for the minimum Miller loop length in Ate_i pairing based on Brezing-Weng curves, in terms of the involved parameters, under a mild condition on the parameters. I...
Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves
public-key cryptography / elliptic curve cryptosystem pairing, number theory
2012/3/30
We provide a simple and exact formula for the minimum Miller loop length in Ate_i pairing based on Brezing-Weng curves, in terms of the involved parameters, under a mild condition on the parameters. I...