搜索结果: 1-7 共查到“军事学 Assessing”相关记录7条 . 查询时间(1.859 秒)
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Side-channel analysis LWE Frodo
2018/7/18
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both parameter and implementation choices on their side-channel resilience is still poorly understood. Aysu e...
The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes (Book Review)
Weapons Inspections Verification Regimes WMD
2019/10/21
Nathan E. Busch and Joseph F. Pilat in their book The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes draw attention to the important role that politics ca...
Assessing the No-Knowledge Property of SpiderOak ONE
Cloud storage end-to-end encryption SpiderOak
2017/6/15
This paper presents the findings of an independent security review of SpiderOak ONE, a popular encrypted cloud storage application. In this application, the storage provider claims that, since all the...
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
finite fields discrete logarithm problem tower number field sieve
2016/12/7
In the past two years there have been several advances in Number Field Sieve (NFS) algorithms for computing discrete logarithms in finite fields \fpn\fpn where pp is prime and n>1n>1 is a small intege...
Cryptography relies on the secrecy of keys. Measures of information, and thus secrecy, are called entropy. Previous work does not formally assess the cryptographically appropriate entropy of secret ke...
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
Credibility of Online Personas Social Networks
2009/6/12
The success of the Internet has significantly changed
how people interact with each other. Rich social interactions
nowadays take place online. Users read, shop,
chat, work, and play on the Interne...
Assessing security of some group based cryptosystems
Assessing security group cryptosystems
2009/4/9
Assessing security of some group based cryptosystems.