搜索结果: 1-14 共查到“军事学 Transparency”相关记录14条 . 查询时间(0.078 秒)
The Notion of Transparency Order, Revisited
Transparency order Differential power analysis S-box
2019/6/12
We revisit the definition of Transparency Order (TO) and that of Modified Transparency Order (MTO) as well, which were proposed to measure the resistance of an S-box against Differential Power Analysi...
The security of web communication via the SSL/TLS protocols relies on safe distributions of public keys associated with web domains in the form of X.509X.509 certificates. Certificate authorities (CAs...
CertLedger: A New PKI Model with Certicate Transparency Based on Blockchain
PKI SSL/TLS Certicate Transparency
2018/11/12
In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues. To prevent such iss...
Transparency Logs via Append-only Authenticated Dictionaries
implementation key management public-key cryptography
2018/8/6
Transparency logs allow users to audit a potentially malicious service, paving the way towards a more accountable Internet. For example, Certificate Transparency (CT) enables domain owners to audit Ce...
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
system security software updates decentralization
2017/7/6
Software-update mechanisms are critical to the security of modern systems, but their typically centralized design presents a lucrative and frequently attacked target. In this work, we propose CHAINIAC...
In this paper, we initiate a formal study of transparency, which in recent years has become an increasingly
critical requirement for the systems in which people place trust. We present the abstract c...
Secure Logging Schemes and Certificate Transparency
Certificate Transparency public key infrastructures (PKI) logging schemes
2016/5/11
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...
. In this paper, we consider the multi-bit Differential Power
Analysis (DPA) in the Hamming weight model. In this regard, we revisit
the definition of Transparency Order (TO) from the work of Prouff...
CONIKS: Bringing Key Transparency to End Users
Public key verification key transparency end-to-end secure communication
2016/1/5
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates bu...
Insynd: Privacy-Preserving Transparency Logging Using Balloons
cryptographic protocols secure logging
2016/1/4
Insynd is a cryptographic scheme for privacy-preserving transparency logging. In the setting of transparency logging, a service provider continuously logs descriptions of its data processing on its us...
Generating and standardizing elliptic curves to use them in a cryptographic context is a hard task. In this note, we don’t make an explicit proposal for an elliptic curve, but we deal with the followi...
Enhanced certificate transparency and end-to-end encrypted mail
public key certificates email security
2014/3/8
The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend "certificate t...
Sanitizable signatures with strong transparency in the standard model
sanitizable signatures strong transparency standard model
2010/4/7
Sanitizable signatures provide several security features which
are useful in many scenarios including military and medical applications.
Sanitizable signatures allow a semi-trusted party to update s...
Approaches to Transparency in Arms Control and Verification - A Canadian View of Chinese Perspectives
Transparency Arms Control and Verification Canadian View of Chinese Perspectives
2009/3/12
China and Canada represent nearly two opposite ends of a continuum
starting with near-total secrecy and ending at near-total transparency in matters of state. Canada advocates transparency, and Chin...