搜索结果: 1-15 共查到“军事学 The Limits”相关记录28条 . 查询时间(0.093 秒)
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Side-Channel Attacks Security Evaluations Certification
2019/9/16
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS d...
Limits to Non-Malleability
non-malleable codes black box impossibility tamper-resilient cryptography
2019/5/9
There have been many successes in constructing explicit non-malleable codes for various classes of tampering functions in recent years, and strong existential results are also known. In this work we a...
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
FCA full collision group collision attack
2019/1/9
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
Deconstructing the Blockchain to Approach Physical Limits
Blockchains physical limits deconstruction
2018/11/5
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these m...
Limits of Practical Sublinear Secure Computation
Secure Computation Private Information Retrieval Sublinear Communication
2018/6/6
Secure computations on big data call for protocols that have sublinear communication complexity in the input length. While fully homomorphic encryption (FHE) provides a general solution to the problem...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
pseudorandom generators local computation obfuscation
2017/4/12
As a corollary, we refute some conjectures recently made in the cryptographic literature. This includes refuting the assumptions underlying Lin and Tessaro's recently proposed candidate construction f...
AES is often considered as a target of such analyses, simply because AES or its building blocks are used in many settings that go beyond classical encryption. The most recent known-key model of Gilber...
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Algebraic curves Jacobian torsion limit
2016/1/23
The Ihara limit (or constant) A(q) has been a central problem of study in the asymptotic theory of global function fields (or equivalently, algebraic curves over finite fields). It addresses global ...
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
implementation differential power analysis
2016/1/9
Following the pioneering CRYPTO ’99 paper by Kocher et
al. differential power analysis (DPA) was initially geared around lowcost
computations performed using standard desktop equipment with
minimal...
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
authenticated key exchange (AKE) security models impossibility results
2016/1/9
State-of-the-art authenticated key exchange (AKE) protocols are proven secure in gamebased
security models. These models have considerably evolved in strength from the original
Bellare-Rogaway model...
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
security assumptions functional encryption scheme
2015/12/31
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a
“central hub” for almost all known cryptographic tasks, and as an extremely powerful building
block for new...
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Algebraic function fields torsion limits Riemann-Roch systems of equations
2015/12/29
Recent results of Cascudo, Cramer, and Xing on the construction of
arithmetic secret sharing schemes are improved by using some new bounds
on the torsion limits of algebraic function fields. Further...
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Authenticated Encryption Composability Constructive Cryptography
2015/12/23
. Robust authenticated encryption (RAE) is a primitive for
symmetric encryption that allows to flexibly specify the ciphertext expansion,
i.e., how much longer the ciphertext is compared to the plai...
Limits of Extractability Assumptions with Distributional Auxiliary Input
Extractability assumptions obfuscation
2014/3/6
Extractability, or “knowledge,” assumptions (such as the “knowledge-of-exponent” assumption) have recently gained popularity in the cryptographic community—leading to the study of primitives such as e...