搜索结果: 1-15 共查到“军事学 circuit”相关记录51条 . 查询时间(0.078 秒)
Reducing the Cost of Implementing AES as a Quantum Circuit
quantum cryptanalysis quantum circuit Grover’s algorithm AES
2019/7/24
To quantify security levels in a post-quantum scenario, it is common to use the quantum resources needed to attack AES as a reference value. Specifically, in NIST’s ongoing post-quantum standardizatio...
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
AES SBox circuit area circuit depth
2019/7/15
In this paper we consider various methods and techniques to find the smallest circuit realizing a given linear transformation on nn input signals and mm output signals, with a constraint of a maximum ...
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Card-based protocols Secure computations Garbled circuits
2019/4/16
It is known that information-theoretically secure computation can be done by using a deck of physical cards. In card-based protocols, shuffles, which covertly rearrange the order of cards according to...
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
Multi-party computation secure function evaluation logic synthesis
2019/3/13
Secure Multi-party Computation (MPC) is one of the most influential achievements of modern cryptography: it allows evaluation of an arbitrary function on private inputs from multiple parties without r...
Efficient Circuit-based PSI with Linear Communication
Private Set Intersection Secure Computation
2019/3/4
We present a new protocol for computing a circuit which implements the private set intersection functionality (PSI). Using circuits for this task is advantageous over the usage of specific protocols f...
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Lightweight cryptography MDS matrix Involutory matrix
2019/2/27
MDS matrices are important building blocks providing diffusion functionality for the design of many symmetric-key primitives. In recent years, continuous efforts are made on the construction of MDS ma...
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
Garbled Circuit Universal Circuit GC framework
2018/9/6
Two-party Secure Function Evaluation (SFE) allows two parties to evaluate a function known to both parties on their private inputs. In some settings, the input of one of the parties is the definition...
We study secret sharing schemes for general (non-threshold) access structures. A general secret sharing scheme for nn parties is associated to a monotone function F:{0,1}n→{0,1}F:{0,1}n→{0,1}. In such...
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
digital currencies anonymity zero knowledge
2018/3/6
Digital currencies like Bitcoin and other blockchain based systems provide means to record monetary transfers between accounts. In Bitcoin like systems transactions are published on a decentralized le...
While there has been a lot of progress in designing efficient custom protocols for computing Private Set Intersection (PSI), there has been less research on using generic Multi-Party Computation (MPC)...
ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping
Privacy-Preserving Computation Yao’s Garbled Circuit SecureProcessor
2017/11/30
We present ARM2GC, a novel secure function evaluation framework based on Yao’s Garbled Circuit (GC) protocol and the ARMprocessor. It allows users to develop privacy-preserving applications using high...
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability
Zero-knowledge arithmetic circuit ideal linear commitments
2017/9/14
We give computationally efficient zero-knowledge proofs of knowledge for arithmetic circuit satisfiability over a large field. For a circuit with N addition and multiplication gates, the prover only u...
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Side-channel countermeasures masking formal verification
2017/9/14
We describe a technique to formally verify the security of masked implementations against side-channel attacks, based on elementary circuit transformations. We describe two complementary approaches: a...
More Efficient Universal Circuit Constructions
Universal circuit private function evaluation function hiding
2017/8/28
A universal circuit (UC) can be programmed to simulate any circuit up to a given size nn by specifying its program bits. UCs have several applications, including private function evaluation (PFE). The...
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
secure multiparty computation garbled circuit input correctness
2017/6/15
Secure multi-party computation allows a number of participants to securely evaluate a function on their private inputs and has a growing number of applications. Two standard adversarial models that tr...