搜索结果: 1-14 共查到“军事学 joint”相关记录14条 . 查询时间(0.169 秒)
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Signatures Related-Key attack
2014/3/12
This paper introduces key-versatile signatures. Key-versatile signatures allow us to sign with keys already in use for another purpose, without changing the keys and without impacting the security of ...
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
AES software power analysis
2014/3/5
The Side Channel Analysis is now a classic way to retrieve a secret key in the smart-card world. Unfortunately, most of the ensuing attacks require the plaintext or the ciphertext used by the embedded...
In this paper, we introduce the notion of a joint compartmented threshold access structure (JCTAS). We study the necessary conditions for the existence of an ideal and perfect secret sharing scheme an...
On the Joint Security of Encryption and Signature in EMV
applications / EMV signature encryption attack
2012/3/22
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encryption. We give a theor...
On the Joint Security of Encryption and Signature in EMV
applications / EMV ignature encryption attack
2012/3/21
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encryption. We give a theor...
On the Joint Security of Encryption and Signature in EMV
applications / EMV signature encryption attack
2012/6/14
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encryption. We give a theor...
We revisit the topic of joint security for combined public key schemes, wherein a single keypair is used for both encryption and signature primitives in a secure manner. While breaking the principle o...
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Elliptic Curve Cryptography Minimal Weight Conversion Average Joint Hamming Weight Digit Set Expansion
2010/7/13
In this paper, we propose the minimal joint Hamming weight conversion for any binary expansions of $d$ integers. With redundant representations, we may represent a number by many expansions, and the m...
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Multi-exponentiation Multi-scalar multiplication Joint sparse form
2009/6/5
Multi-exponentiation is a common and time consuming operation in public-key cryptography. Its elliptic curve
counterpart, called multi-scalar multiplication is extensively used for digital signature ...
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Joint State Theorems Public-Key Encryption Digital Signature Functionalities
2009/6/2
Composition theorems in simulation-based approaches allow to build complex protocols
from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and
Rabin, this modular...
On the Security of Joint Signature and Encryption.
Democratic Group Signatures on Example of Joint Ventures
group-oriented signatures, ”trust but verify” anonymity
2009/3/19
In the presence of economic globalization joint venture is one of the most common and effective means
of conducting business internationally. By building joint ventures companies form strategic allia...