搜索结果: 1-10 共查到“军事学 Distributions”相关记录10条 . 查询时间(0.125 秒)
Discretisation and Product Distributions in Ring-LWE
Ring-LWE Discretisation Homomorphic Encryption
2019/6/3
A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for d...
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
security evaluation Renyi divergence square-friendly
2019/1/26
Dodis and Yu (TCC 2013) studied how the security of cryptographic primitives that are secure in the "ideal" model in which the distribution of a randomness is the uniform distribution, is degraded whe...
PRank: Fast Analytical Rank Estimation via Pareto Distributions
rank estimation side-channel
2018/6/5
These estimations are particularly useful where the key is not reachable with exhaustive search. We propose a new method called PRank for rank estimation, that is conceptually simple, and more time an...
Noise Distributions in Homomorphic Ring-LWE
Ring Learning with Errors Subgaussian Random Variable Homomorphic Encryption
2017/7/24
We develop a statistical framework to analyse the Ring-LWE processes of A Toolkit for Ring-LWE Cryptography (Eurocrypt 2013) and similar processes. We consider the δδ-subgaussian random variables used...
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
lattice cryptography pre-image sampling
2016/1/5
At the center of many lattice-based constructions is an algorithm that samples a short vector s, satisfying [A|AR−HG]s=tmodq where A,AR,H,G are public matrices and R is a trapdoor. Although the ...
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Public-key encryption selective opening security Markov
2015/12/23
About three decades ago it was realized that implementing private channels between parties
which can be adaptively corrupted requires an encryption scheme that is secure against selective
opening at...
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
AES software power analysis
2014/3/5
The Side Channel Analysis is now a classic way to retrieve a secret key in the smart-card world. Unfortunately, most of the ensuing attacks require the plaintext or the ciphertext used by the embedded...
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
public-key cryptography / Public-key encryption deterministic encryption randomness extraction.
2013/4/18
Bellare, Boldyreva, and O'Neill (CRYPTO '07) initiated the study of deterministic public-key encryption as an alternative in scenarios where randomized encryption has inherent drawbacks. The resulting...
We show that there is a direct relation between the maximum length of
the keys extracted from biometric data and the error rates of the biometric
system. The length of the bio-key depends on the amo...
Probability distributions of Correlation and Diferentials in Block Ciphers
Block ciphers Probability Distributions Linear cryptanalysis
2009/2/17
In this paper, we derive the probability distributions of difference propagation proba-
bilities and input-output correlations for random functions and block ciphers, for several
of them for the fir...