搜索结果: 1-15 共查到“军事学 Library”相关记录16条 . 查询时间(0.175 秒)
SELL v1.0: Searchable Encrypted Logging Library
Secure logging dynamic searchable symmetric encryption privacy-preserving
2019/4/16
We present a practical solution to design a secure logging system that provides confidentiality, integrity, completeness, and non-repudiation. To the best of our knowledge, our solution is the first p...
HACL* is a new verified cryptographic library that implements popular modern cryptographic primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC authentication, SHA-256 ...
Achieving fully homomorphic encryption was a longstanding open problem in cryptography until it was resolved by Gentry in 2009. Soon after, several homomorphic encryption schemes were proposed. The ea...
Integration of hardware tokens in the Idemix library
Attribute-based credentials smart cards privacy
2016/1/7
The Idemix library provides the implementation of the
Camenisch-Lysyanskaya (CL) Attribute-based Credential System (ABC),
its protocol extensions and the U-Prove ABC [3, 7]. In the case of the
CL A...
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
cryptanalysis digital signatures implementation
2015/12/31
This paper describes a bug in the implementation of the RabinWilliams
digital signature in the Crypto++ framework. The bug is in
the misuse of blinding technique that is aimed at preventing timing
...
cuHE: A Homomorphic Encryption Accelerator Library
Homomorphic evaluation GPU acceleration large polynomial arithmetic
2015/12/23
We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes
defined over polynomial rings enabled with a number of optimizations including algebraic techniques
for efficient e...
Λ◦λ :A Functional Library for Lattice Cryptography
lattice cryptography Ring-LWE fully homomorphic encryption
2015/12/21
Theory affinity: Λ◦λ is designed from the ground-up around the specialized ring representations, fast
algorithms, and worst-case hardness proofs that have been developed for the Ring-LWE proble...
One major need in the context of Privacy Enhancing Technologies
(PETs) is to bridge theoretical proposals and practical implementations.
In order to foster easy deployment of PETs, the crux is on
p...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Reconfigurable Video Coding (RVC) dataflow programming reconfigurability
2012/6/14
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Crypto Tools Library (CTL) Reconfigurable Video Coding (RVC) dataflow programming reconfigurability platform independence multi-core.
2012/3/20
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
The security impact of a new cryptographic library
confidentiality integrity simplicity speed security
2012/6/14
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic...
The security impact of a new cryptographic library
implementation / confidentiality integrity simplicity speed security
2012/3/21
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic...
The security impact of a new cryptographic library
implementation / confidentiality integrity simplicity speed security
2012/3/22
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic...
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Reconfigurable Video Coding (RVC) dataflow programming reconfigurability
2012/8/28
The diversity of computing platforms is increasing rapidly. In order to allow security applications to run on such diverse platforms, implementing and optimizing the same cryptographic primitives for ...
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
Threshold Homomorphic Encryption Cryptographic Library cryptographic protocols
2009/6/8
Protocol security analysis has become an active research topic in recent years.
Researchers have been trying to build sufficient theories for building auto-
mated tools, which give security proofs f...