搜索结果: 1-15 共查到“achieving”相关记录97条 . 查询时间(0.687 秒)
Achieving equitable access to energy in a changing climate
energy access climate change economic development
2021/8/6
Access to modern, reliable, and affordable energy services is a must for development and ensuring a decent quality of life. Researchers used a novel bottom-up approach to analyze how access to energy ...
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
cryptographic protocols Anonymous communication
2019/7/15
Anonymous communication, that is secure end-to-end and unlinkable, plays a critical role in protecting user privacy by preventing service providers from using message metadata to discover communicatio...
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
Achieving GWAS with Homomorphic Encryption
GWAS Homomorphic Encryption Logistic Regression
2019/2/26
One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This rais...
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
n-bit security beyond birthday bound tweakable blockcipher
2018/11/19
Strong Pseudo-random Permutations (SPRPs) are important for various applications. In general, it is desirable to base an SPRP on a single-keyed primitive for minimizing the implementation costs. For c...
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
key dependent message security chosen ciphertext security projective hash function
2018/11/16
We propose a framework for achieving a public-key encryption (PKE) scheme that satisfies key dependent message security against chosen ciphertext attacks (KDM-CCA security) based on projective hash fu...
Achieving Fair Treatment in Algorithmic Classification
fairness classification black-box algorithms
2018/11/8
Fairness in classification has become an increasingly relevant and controversial issue as computers replace humans in many of today’s classification tasks. In particular, a subject of much recent deba...
ACHIEVING THE STATE OF RESEARCH PERTAINING TO GIS APPLICATIONS FOR CULTURAL HERITAGE BY A SYSTEMATIC LITERATURE REVIEW
Geographic Information Systems GIS, Cultural Heritage
2018/11/9
During the last decade, we have witnessed an increased interest in Geographic Information Systems (GIS), including the so-called “Historical GIS”, 3D GIS heritage and its subcategory of “SDI for cultu...
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
public-key cryptography RSA
2018/5/28
Thus far, several lattice-based algorithms for partial key exposure attacks on RSA, i.e., given the most/least significant bits (MSBs/LSBs) of a secret exponent dd and factoring an RSA modulus NN, hav...
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
FMRS secret-key cryptography
2018/5/15
With the advancement of Cloud computing, people now store their data on remote Cloud servers for larger computation and storage resources. However, users’ data may contain sensitive information of use...
Tight Private Circuits: Achieving Probing Security with the Least Refreshing
Side-channel Masking Composition
2018/5/15
Masking is a common countermeasure to secure implementations against side-channel attacks. In 2003, Ishai, Sahai, and Wagner introduced a formal security model, named t-probing model, which is now wid...
A Cyber Federal Deposit Insurance Corporation: Achieving Enhanced National Security
Insurance Corporation National Security Shared Risk Shared Defense
2019/10/22
Of the emerging man-made risks affecting U.S. national security, cyber threats have enjoyed the most attention and resources from national security leaders and policymakers. And yet, cyber threats rem...
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency
Searchable Encryption Locality Read Efficiency
2017/8/9
We propose the first linear-space searchable encryption scheme with constant locality and sublogarithmic read efficiency, strictly improving the previously best known read efficiency bound (Asharov et...
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
lattice-based group signatures full dynamicity updatable Merkle trees
2017/4/27
Lattice-based group signature is an active research topic in recent years. Since the pioneering work by Gordon, Katz and Vaikuntanathan (Asiacrypt 2010), eight other schemes have been proposed, provid...
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
DPA countermeasures threshold scheme Keccak
2016/12/7
Since they were first proposed as a countermeasure against differential power analysis (DPA) in 2006, threshold schemes have attracted a lot of attention from the community concentrating on cryptograp...