搜索结果: 1-9 共查到“军队指挥学 Formal analysis”相关记录9条 . 查询时间(0.05 秒)
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Provable security Computationally complete symbolic attacke Vote privacy
2018/6/25
We analyze the FOO electronic voting protocol in the provable secu- rity model using the technique of Computationally Complete Symbolic Attacker (CCSA). The protocol uses commitments, blind signatures...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats b...
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)
Formal analysis Anonymous Credential ProVerif
2017/11/21
This paper firstly introduces a novel security definition for BLAC-like schemes (BLAC represents TTP-free BLacklist-able Anonymous Credentials) in the symbolic model using applied pi calculus, which i...
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Chaumian Mix Nets Privacy Verifiability
2016/1/9
Mix nets with randomized partial checking (RPC mix nets) have been introduced by
Jakobsson, Juels, and Rivest as particularly simple and efficient verifiable mix nets. These
mix nets have been used ...
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro Debdeep Mukhopadhyay
2015/12/18
Formally bounding side-channel leakage is important to bridge the gap between the theory and practice in cryptography. However, bounding side-channel leakages is difficult because leakage in a crypto-...
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
fault injection BellCoRe attack
2014/3/5
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged ...
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
implementation
2012/3/26
Several types of countermeasures against side-channel attacks are known. The one called masking is of great interest since it can be applied to any protocol and/or algorithm, without nonetheless requi...
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Authentication Password Smart Card Guessing Attack
2008/12/12
One of the most commonly used two-factor authentication
mechanisms is based on smart card and user's password. Throughout the
years, there have been many schemes proposed, but most of them have
alr...
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Authentication Password Smart Card Guessing Attack
2008/12/11
One of the most commonly used two-factor authentication
mechanisms is based on smart card and user's password. Throughout the
years, there have been many schemes proposed, but most of them have
alr...