搜索结果: 1-15 共查到“军事学 tests”相关记录19条 . 查询时间(0.187 秒)
The Power of NIST Cryptographic Statistical Tests Suite
Statistical testing Cryptographic evaluation Random bit generators
2019/8/8
This paper is focused on an open question regarding the correlation and the power of NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve the ...
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
side-channel analysis leakage detection security certification
2019/6/14
An established ingredient in the security evaluation of cryptographic devices is leakage detection, whereby physically observable characteristics such as the power consumption are measured during oper...
A note on the correlations between NIST cryptographic statistical tests suite
statistical testing cryptographic evaluation random bit generators
2019/5/24
This paper is focused on an open question regarding the correlation and the power of the NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve ...
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
multi-client functional encryption predicate-only encryption privacy-preserving multi-client monitoring
2018/6/5
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitor...
In this paper we focus on three open questions regarding NIST SP 800-22 randomness test: the probability of false acceptance, the number of minimum sample size to achieve a given probability error and...
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22
Statistical randomness test NIST SP800-22 random number generator
2016/12/9
Random number generators (RNGs) are essential for cryptographic systems, and statistical tests are usually employed to assess the randomness of their outputs. As the most commonly used statistical tes...
Detecting flawed masking schemes with leakage detection tests
side-channel analysis DPA masking
2016/3/16
Masking is a popular countermeasure to thwart side-channel attacks on embedded systems. Many proposed masking schemes, even carrying ``security proofs'', are eventually broken because they are flawed ...
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
foundations pseudorandomness
2016/1/26
Random numbers have been one of the most useful objects in statistics, computer science, cryptography, modeling, simulation, and other applications though it is very dicult to construct true randomne...
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
bilinear pairings quasi-adaptive
2014/3/6
We state a switching lemma for tests on adversarial inputs involving bilinear pairings in hard groups, where the tester can effectively switch the randomness used in the test from being given to the a...
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
Side-channel analysis leakage detection
2014/3/12
The development of a leakage detection testing methodology for the side-channel resistance of cryptographic devices is an issue that has received recent focus from standardisation bodies such as NIST....
Local limit theorem for large deviations and statistical box-tests
random allocations large deviations box-test power
2011/7/25
Let $n$ particles be independently allocated into $N$ boxes, where the $l$-th box appears with the probability $a_l$.
Local limit theorem for large deviations and statistical box-tests
secret-key cryptography / hash functions
2012/3/28
Let $n$ particles be independently allocated into $N$ boxes, where the $l$-th box appears with the probability $a_l$. Let $\mu_r$ be the number of boxes with exactly $r$ particles and $\mu=[ \mu_{r_1}...
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
The Cube Attack Stream Cipher Trivium Quadraticity Tests
2011/1/20
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers Trivium and Grain- 128...
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
secret-key cryptography / cube attack quadraticity tests
2012/3/30
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers Trivium and Grain- 128...
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
The Cube Attack Stream Cipher Trivium Quadraticity Tests
2010/11/22
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers Trivium and Grain- 128...