搜索结果: 1-15 共查到“军队指挥学 static”相关记录18条 . 查询时间(0.078 秒)
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
Predicate Encryption Adaptive Security Standard Model
2018/12/11
In a recent work, Katz et al. (CANS'17) generalized the notion of Broadcast Encryption to define Subset Predicate Encryption (SPE) that emulates \emph{subset containment} predicate in the encrypted do...
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Bilinear target assumption q-type assumption DejaQ technique and Dual form signature technique
2018/8/16
A large number of parameterized complexity assumptions have been introduced in the bilinear pairing setting to design novel cryptosystems and an important question is whether such ``qq-type" assumptio...
Static Power Side-Channel Analysis - A Survey on Measurement Factors
CMOS Measurement Factors
2018/7/16
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling
memory-hard functions pebbling space-time trade-offs
2018/3/5
Pebble games were originally formulated to study time-space tradeoffs in computation, modeled by games played on directed acyclic graphs (DAGs). Close connections between pebbling and cryptography hav...
Searchable symmetric encryption (SSE) enables data owners to conduct searches over encrypted data stored by an untrusted server, retrieving only those encrypted files that match the search queries. Se...
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
side-channel analysis masking
2016/12/12
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. The continuous growth of the leakage power d...
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions
inner-product-predicate encryption attribute-based encryption
2016/12/9
This paper presents expressive predicate encryption (PE) systems, namely non-zero inner-product-predicate encryption (NIPPE) and attribute-based encryption (ABE) supporting monotone span programs achi...
Side-Channel Leakage through Static Power – Should We Care about in Practice? –
Side-Channel Analysis Staic Power Consumption
2016/1/26
By shrinking the technology static power consumption of CMOS circuits is becoming a major concern. In this paper, we present the first practical results of exploiting static power consumption of FPGA-...
Exponent-inversion Signatures and IBE under Static Assumptions
Dual form signature Identity-based encryption Exponent inversion
2016/1/23
Boneh-Boyen signatures are widely used in many advanced cryptosystems. It has a structure of “inversion in the exponent”, and its unforgeability against q chosen-messages attack is proven under the ...
Adaptive versus Static Security in the UC Model
universally composable security adaptive security
2016/1/8
We show that for certain class of unconditionally secure protocols and target functionalities,
static security implies adaptive security in the UC model. Similar results were previously
only known f...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration, and it derives formal, qua...
Static Fault Attacks on Hardware DES Registers
Hardware DES fault attacks safe-error register attacks
2012/3/26
In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit loc...
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS
public-key cryptography / public-key encryption with keyword search dynamic index technique static index technique secure hybrid search
2012/3/28
With a significant advance in ciphertext searchability, Public-key encryption with keyword search (PEKS) is the first keyword searchable encryption scheme based on the probabilistic encryption, such t...
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Static Diffie-Hellman problem elliptic curves
2010/4/7
We show that for any elliptic curve E(Fqn), if an adversary
has access to a Static Diffie-Hellman Problem (SDHP) oracle, then by
making O(q1− 1n+1 ) SDHP oracle queries during an initial learn...
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Postponed ephemeral keys pseudo-static keys tripartite key agreement
2009/9/2
We propose an new one-round implicitly authenticated three-party protocol that ex-
tends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single
communication rou...