搜索结果: 1-15 共查到“军事学 Programming”相关记录18条 . 查询时间(0.062 秒)
*Constrained* pseudorandom functions allow for delegating ``constrained'' secret keys that let one compute the function at certain authorized inputs---as specified by a constraining predicate---while ...
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Secret sharing Information inequalities Rank inequalities
2017/9/25
We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of s...
Analysis of AES, SKINNY, and Others with Constraint Programming
Differential Cryptanalysis Integral Cryptanalysis Constraint Programming
2017/2/24
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show ...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming
Conversion Bilinear Groups Integer Programming
2016/6/6
Bilinear-type conversion is to convert cryptographic schemes designed over symmetric groups instantiated with imperilled curves into ones that run over more secure and efficient asymmetric groups. In ...
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
public-key cryptography zero-knowledge efficiency
2016/5/9
These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of thi...
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Finite automaton ARX cipher Modulo addition
2016/4/7
Inspired by Fu et al. work on modeling the exclusive-or differential property of the modulo addition as an mixed-integer programming problem, we propose a method with which any finite automaton can be...
A Punctured Programming Approach to Adaptively Secure Functional Encryption
public-key cryptography Functional Encryption Obfuscation
2016/1/8
We propose the first construction for achieving adaptively secure functional encryption (FE) for poly-sized circuits (without complexity leveraging) from indistinguishability obfuscation (iO). Our red...
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Automatic cryptanalysis Related-key differential attack Mixed-integer Linear Programming
2016/1/4
In IACR ePrint 2014/747, a method for constructing mixed-integer linear programming (MILP) models whose feasible regions are exactly the sets of all possible differential (or linear) characteristics f...
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
secret sharing threshold cryptography zero knowledge
2015/12/31
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, ev...
Domain-Polymorphic Programming of Privacy-Preserving Applications
implementation secure multiparty computation
2014/3/12
Secure Multiparty Computation (SMC) is seen as one of the main enablers for secure outsourcing of computation. Currently, there are many different SMC techniques (garbled circuits, secret sharing, hom...
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
cryptanalysis linear programming
2014/3/12
In this paper we demonstrate a number of attacks against proposed protocols for privacy-preserving linear programming, based on publishing and solving a transformed version of the problem instance. Ou...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Reconfigurable Video Coding (RVC) dataflow programming reconfigurability
2012/6/14
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Crypto Tools Library (CTL) Reconfigurable Video Coding (RVC) dataflow programming reconfigurability platform independence multi-core.
2012/3/20
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Reconfigurable Video Coding (RVC) dataflow programming reconfigurability
2012/8/28
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...