搜索结果: 1-7 共查到“军事学 separation”相关记录7条 . 查询时间(0.156 秒)
On Abelian Secret Sharing: duality and separation
Access structure Duality Characteristic-dependent information ratio
2019/5/29
Unlike linear secret sharing, very little is known about abelian secret sharing. In this paper, we present two results on abelian secret sharing. First, we show that the information ratio of access st...
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
post-quantum cryptography one-way permutation one-way trapdoor permutation
2018/11/12
Since the celebrated work of Impagliazzo and Rudich (STOC 1989), a number of black-box impossibility results have been established. However, these works only ruled out classical black-box reductions a...
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions
Leakage-resilience authenticated encryption leveled implementations
2018/5/28
We propose definitions and constructions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of side-channel leakages and nonce misuse. This is part of an impo...
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
Algebraic eraser braid group colored Burau presentation
2018/5/28
In this paper, we consider the conjugacy separation search problem in braid groups. We deeply redesign the algorithm presented in (Myasnikov & Ushakov, 2009) and provide an experimental evidence that ...
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
side-channel analysis signal processing filtering
2016/3/23
Singular Spectrum Analysis (SSA) is a powerful data decomposition/recomposition technique that can be used to reduce the noise in time series. Compared to existing solutions aiming at similar purposes...
Non-malleability under Selective Opening Attacks: Implication and Separation
public-key encryption, non-malleability, selective opening attack
2015/12/31
We formalize the security notions of non-malleability under selective opening attacks
(NM-SO security) in two approaches: the indistinguishability-based approach and the simulationbased
approach. We...
Image Encryption by Pixel Property Separation
Pixel Property Separation Image Encryption Cryptanalytic Error Avalanche Effect
2009/6/11
Pixels in an image are essentially constituted of two properties, position and colour. Pixel Property Separation, a radically different
approach for Symmetric-key image encryption, separates these pr...