搜索结果: 1-15 共查到“密码学 parameters”相关记录42条 . 查询时间(0.121 秒)
On cryptographic parameters of permutation polynomials of the form xrh(x(q−1)/d)
Permutation Polynomials Differential Uniformity Boomerang Uniformity
2019/7/8
The differential uniformity, the boomerang uniformity, and the extended Walsh spectrum etc are important parameters to evaluate the security of S(substitution)-box. In this paper, we introduce efficie...
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
AKE provable security tightness
2019/6/24
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols which are extremely simple and efficient. Unli...
New non-linearity parameters of Boolean functions
Boolean functions nonlinearity optimal functions bent functions
2019/6/4
The study of non-linearity (linearity) of Boolean function was initiated by Rothaus in 1976. The classical non-linearity of a Boolean function is the minimum Hamming distance of its truth table to tha...
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
OpenSSL Elliptic curve cryptography Invalid curve attack
2019/4/22
In this paper, we describe several practically exploitable fault attacks against OpenSSL's implementation of elliptic curve cryptography, related to the singular curve point decompression attacks of B...
Efficient Multi-key FHE with short extended ciphertexts and less public parameters
Multi-key FHE BGV scheme ciphertext extension
2018/11/2
Multi-Key Full Homomorphic Encryption scheme (MKFHE) can perform arbitrary operation on encrypted data under different public keys (users), and the final ciphertext can be jointly decrypted. Therefore...
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
s-box substitution involutory substitution
2018/4/25
S-boxes are important parts of modern ciphers. To construct S-boxes having cryptographic parameters close to optimal is an unsolved problem at present time. In this paper some new methods for generati...
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Leakage-resilient AMD Algebraic Manipulation Detection Leakage resilient codes
2018/1/17
Algebraic Manipulation Detection (AMD) codes [CDF+08] are keyless message authentication codes that protect messages against additive tampering by the adversary assuming that the adversary cannot “see...
Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model
SNARKs zero-knowledge multi-party computation
2017/11/1
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuable tool for verifiable computation and privacy preserving protocols. Currently practical schemes requ...
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU
NTRU smaller modulus
2017/10/9
Albrecht et al. at Crypto 2016 and Cheon et al. at ANTS 2016 independently presented a subfield attack on overstretched NTRU problem. Their idea is to map the public key down to the subfield (by norm ...
Optimal Parameters for XMSS^MT
hash-based signatures parameter selection linear optimization
2017/10/9
We introduce Multi Tree XMSS (XMSS^MT), a hash-based signature scheme that can be used to sign a virtually unlimited number of messages. It is provably forward and hence EU-CMA secure in the standard ...
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Anonymity Differential Privacy
2017/9/18
Differential privacy, and close other notions such as dχdχ-privacy, is at the heart of the privacy framework when considering the use of randomization to ensure data privacy. Such a guarantee is alway...
A Framework to Select Parameters for Lattice-Based Cryptography
Lattice-Based Cryptography Ideal Lattices Parameter Selection
2017/6/28
Selecting parameters in lattice-based cryptography is a challenging task, which is essentially accomplished using one of two approaches. The first (very common) approach is to derive parameters assumi...
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
SNARKs zero-knowledge cryptocurrencies
2017/6/26
Recent efficient constructions of zero-knowledge Succinct Non-interactive Arguments of Knowledge (zk-SNARKs), require a setup phase in which a common-reference string (CRS) with a certain structure is...
An Analysis of FV Parameters Impact Towards its Hardware Acceleration
Homomorphic evaluation FV parameters Chinese Remainder Theorem
2017/3/21
The development of cloud computing services is restrained by privacy concerns. Centralized medical services for instance, require a guarantee of confidentiality when using outsourced computation platf...
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
multivariate public key cryptography differential invariant MinRank
2017/3/6
In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes whi...