搜索结果: 1-11 共查到“军事学 Conditions”相关记录11条 . 查询时间(0.218 秒)
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Primality testing Miller-Rabin test Lucas test
2018/8/20
This work provides a systematic analysis of primality testing under adversarial conditions, where the numbers being tested for primality are not generated randomly, but instead provided by a possibly ...
Necessary conditions for designing secure stream ciphers with the minimal internal states
Stream Cipher Ultra-lightweight Lightweight
2017/8/10
After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design of stream ciphers by using a secret key, not only in the initialization...
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
hash functions SHA-1 counter-cryptanalysis
2017/2/28
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 with a hash collision detection algorithm. That is,...
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
key agreement MQV provable security
2016/1/26
Menezes–Qu–Vanstone key agreement (MQV) is intended to provide implicit key authentication
(IKA) and several other security objectives. MQV is approved and specified in five standards.
Sufficient conditions for sound hashing using a truncated permutation
foundations / permutation-based hashing indifferentiability tree hashing
2012/3/26
In this paper we give a generic security proof for hashing modes that make use of an underlying fixed-length permutation. We formulate a set of five simple conditions, which are easy to implement and ...
Tree hashing has several advantages over sequential hashing such as parallelism and a
lower cost of hash value recomputation when only a small part of the input changes. In this paper
we consider th...
Wang’s sufficient conditions of MD5 are not sufficient
Wang’s sufficient conditions MD5 collision search algorithm
2009/2/23
In this paper, we report that the “sufficient
conditions” of MD5 [1] of the modification
technique for the collision search algorithm described
by Wang [2] are not sufficient. In our
analysis, we ...
Wang and Yu showed that MD5 was not collision-resistant, but it is known that their sufficient
conditions for finding a collision of MD5 includes some mistakes. In this paper, we examine the
suffici...
KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption
KEM DEM Secure Hybrid Encryption
2008/12/10
The KEM/DEM hybrid encryption paradigm combines the efficiency and large message
space of secret key encryption with the advantages of public key cryptography. Due to
its simplicity and °exibility, ...
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
Information-Theoretic Conditions Two-Party Secure Function Evaluation
2008/11/25
The standard security definition of unconditional secure function
evaluation, which is based on the ideal/real model paradigm, has
the disadvantage of being overly complicated to work with in practi...
Sufficient Conditions for Computational Intractability Regarding Generic Algorithms
Generic Group Model Straight-Line Programs Hardness Conditions
2008/5/28
The generic group model is a valuable methodology for analyzing the computational hardness of the number-theoretic problems used in cryptography. Although generic hardness proofs exhibit many similari...