搜索结果: 1-5 共查到“军事学 recover”相关记录5条 . 查询时间(0.073 秒)
Cube attack is an important cryptanalytic technique against symmetric cryptosystems, especially for stream ciphers. The key step in cube attack is recovering superpoly. However, when cube size is larg...
Deterministic Cube Attacks: A New Method to Recover Superpolies in Practice
Trivium cube attacks key recovery attack
2018/11/12
Cube attacks are an important type of key recovery attacks against NFSR-based cryptosystems. The key step in cube attacks closely related to key recovery is recovering superpolies. However, in the pre...
Illuminating the Dark or how to recover what should not be seen
Functional encryption Information leakage Private classification
2018/11/5
Functional encryption (FE) is a cryptographic primitive which allows to partially decrypt ciphertexts, e.g. evaluate a function over encrypted inputs and obtain the output in clear. The downside of em...
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Side-channel Analysis Artificial Neural Networks Power
2018/5/28
Machine learning has become mainstream across industries. In this work we pose the following question: Is it possible to reverse engineer a neural network by using only side-channel information? We an...
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting
Predicate Encryption Public-Key Function Privacy
2017/4/17
We solve the open problem of constructing \emph{computationally function private} public-key predicate encryption schemes. Existing public-key constructions for predicate encryption satisfy a \emph{st...