搜索结果: 1-15 共查到“军队指挥学 verification”相关记录74条 . 查询时间(0.062 秒)
Card-based Cryptography Meets Formal Verification
secure multiparty computation card-based cryptography formal verification
2019/9/17
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation (MPC) with just a deck of cards. For the sake of simplicity, this is often done using ca...
Formal Verification of a Constant-Time Preserving C Compiler
Compilation Formal verification Constant-time security
2019/8/19
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not pe...
QAP-based Simulation-Extractable SNARK with a Single Verification
SNARK non-interactive zero-knowledge proof simulation-extractability
2019/5/31
The pairing-based simulation-extractable succinct non-interactive arguments of knowledge (SE-SNARKs) are attractive since they enable a prover to generate a proof with the knowledge of the witness to ...
Verification of Authenticated Firmware Load
formal methods formal verification model checking
2019/5/28
An important primitive in ensuring security of modern systems-on-chip designs are protocols for authenticated firmware load. These loaders read a firmware binary image from an untrusted input device, ...
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Contingent payments on a public ledger: models and reductions for automated verification
fair exchange security models blockchain
2019/5/9
We study protocols that rely on a public ledger infrastructure, concentrating on protocols for zero-knowledge contingent payment, whose security properties combine diverse notions of fairness and priv...
Decentralised ledgers are a prime application case for consensus protocols. Changing sets of validators have to agree on a set of transactions in an asynchronous network and in the presence of Byzanti...
Non-Interactive Keyed-Verification Anonymous Credentials
Anonymous credentials keyed-verification anonymous credentials non-interactive anonymous credentials
2019/2/27
Anonymous credential (AC) schemes are protocols which allow for authentication of authorized users without compromising their privacy. Of particular interest are non-interactive anonymous credential (...
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
SGX TOFU
2018/11/9
Intel's Software Guard Extensions (SGX) enables isolated execution environments, called enclaves, on untrusted operating systems (OS), and thus it can improve the security for various applications and...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
formal verification noise protocol framework cryptographic protocols
2018/8/21
The Noise Protocol Framework, introduced recently, allows for the design and construction of secure channel protocols by describing them through a simple, restricted language from which complex key de...
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
cryptographic protocols multi-party computation
2018/5/28
In this paper, we present two new and very communication-efficient protocols for maliciously secure multi-party computation over fields in the honest-majority setting with abort. Our first protocol im...
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation of these countermeasures is challenging. Experimental security evaluation requires special equipment,...
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
masking formal verification threshold implementations
2017/9/25
Masking provides a high level of resistance against side-channel analysis. However, in practice there are many possible pitfalls when masking schemes are applied, and implementation flaws are easily o...