搜索结果: 1-15 共查到“军队指挥学 This is the full version.”相关记录50条 . 查询时间(0.109 秒)
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
Timed-Release Encryption With Master Time Bound Key (Full Version)
timed-release encryption Weil pairing bilinear Diffie-Hellman problem
2019/8/8
Timed-release encryption allows senders to send a message to a receiver which cannot decrypt until a server releases a time bound key at the release time. The release time usually supposed to be known...
With the rapid development of quantum technologies, quantum-safe cryptography has found significant attention. Hash-based signature schemes have been in particular of interest because of (i) the impor...
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Division Property Three-Subset STP
2018/12/11
The division property proposed at Eurocrypt'15 is a novel technique to find integral distinguishers, which has been applied to most kinds of symmetric ciphers such as block ciphers, stream ciphers, an...
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version)
flexible public key equivalence classes stealth addresses
2018/3/5
This primitive offers a unified approach to the modular construction of signature schemes with privacy-preserving components. Namely, we show how to build the first ring signature scheme in the plain ...
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)
Formal analysis Anonymous Credential ProVerif
2017/11/21
This paper firstly introduces a novel security definition for BLAC-like schemes (BLAC represents TTP-free BLacklist-able Anonymous Credentials) in the symbolic model using applied pi calculus, which i...
Identity-based Encryption from Codes with Rank Metric, Full Version
Code-based cryptography Rank metric IBE
2017/6/6
Code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signatur...
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)
ARX block ciphers differential cryptanalysis
2016/12/8
We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a...
Designing Optimal Implementations of Linear Layers (Full Version)
Linear Layer XOR Count Equivalence Relation
2016/12/7
Linear layer is a fundamental primitive for many aspects of information
technology. For information security, the performance of a linear layer depends on
two aspects: diffusion ability and implemen...
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)
Boolean functions APN Butterfly structure
2016/6/2
The existence of Almost Perfect Non-linear (APN) permutations
operating on an even number of bits has been a long standing open
question until Dillon et al., who work for the NSA, provided an exampl...
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes(Full version)
Block cipher Feistel-SP Chosen-key
2016/5/26
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied ...
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)
E-Payment Privacy Mobile Devices TrustZone
2016/5/23
Electronic payment (e-payment) has been widely applied to electronic commerce and has especially attracted a large number of mobile users. However, current solutions often focus on protecting users' m...
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Block Ciphers Key-Bridging Technique Automatic Search
2016/5/3
Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. At ASIACRYPT 2011, Dunkelman et al. proposed a technique using the weakness in ...
Algebraic Insights into the Secret Feistel Network (Full version)
High-Degree Indicator Matrix Feistel Network ANF
2016/4/22
We introduce the high-degree indicator matrix (HDIM), an object closely related with both the linear approximation table and the algebraic normal form (ANF) of a permutation. We show that the HDIM of ...
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Differential cryptanalysis PRINCE multiple differentials
2016/1/26
PRINCE is a lightweight block cipher proposed by Borghoff
et al. at Asiacrypt 2012. Due to its originality, novel design and low number
of rounds, it has already attracted the attention of a large n...