搜索结果: 16-30 共查到“implementation”相关记录687条 . 查询时间(0.435 秒)
Pairing-based cryptography is now a mature science. However implementation of a pairing-based protocol can be challenging, as the efficient computation of a pairing is difficult, and the existing lite...
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Post-Quantum Cryptography Lattice-based Encryption Scheme Java Card
2019/1/2
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
On Lions and Elligators: An efficient constant-time implementation of CSIDH
CSIDH Post-Quantum Cryptography constant-time
2018/12/19
The recently proposed CSIDH primitive is a promising candidate for post quantum static-static key exchanges with very small keys. However, until now there is only a variable-time proof-of-concept impl...
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
cryptographic protocols cryptographic algorithms
2018/11/19
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorith...
SEMANTIC MODELING OF UTILITY NETWORKS IMPLEMENTATION OF USE CASES FOR DEHRADUN CITY
OGC CityGML data model Utility Network ADE data storage utility infrastructure use cases
2019/2/27
The current on-going boom in the field of Building Information Modeling (BIM) and 3D GIS is widely being explored for vast urban related applications, analyses and simulations. Large amount of 3D city...
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
MBFFA AES Implementation
2018/11/12
Parallel cryptographic implementations are generally considered to be more advantageous than their non-parallel counterparts in mitigating side-channel attacks because of their higher noise-level. So ...
"S-Box" Implementation of AES is NOT side-channel resistant
AES Side- channel Cache Lookup table
2018/11/5
Several successful cache-based attacks have provided strong impetus for developing side channel resistant software implementations of AES. One of the best-known countermeasures - use of a "minimalist"...
A Key Leakage Preventive White-box Cryptographic Implementation
white-box cryptography gray-box attacks
2018/11/2
A white-box cryptographic implementation is to defend against white-box attacks that allow access and modification of memory or internal resources in the computing device. In particular, linear and no...
VULNERABILITY MAPPING AND ANALYSIS: AN IMPLEMENTATION IN GEOHAZARD AREAS IN SABAH
Landslide vulnerability Geospatial Landslide risk
2018/11/9
Vulnerability identifies the element-at-risk as well as the evaluation of their relationships with the hazard. The relationships relate the landslide potential damages over a specific element-at-risk....
Implementation and Assessment of a Novel APPE Intersession Course to Assess Near-Terminal Student Competence
intersession course experiential education pharmacy curricular assessment curriculum
2019/1/7
Objective. To provide a novel culminating experience that assesses student competence and achievement of five curricular outcomes during the P4 year.Methods. This two-week Intersession course provided...
Implementation and Evaluation of Near-Peer Facilitated Journal Club Activities in a Required MLE Course Series
Implementation Evaluation Near-Peer
2018/11/22
Objective. To describe and evaluate the implementation of multiple, content-integrated journal club activities into a large, required medical literature evaluation (MLE) two-semester course series usi...
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Code-based cryptography Public key cryptography Cryptosystem
2018/8/28
We present and analyze the performance of DRANKULA, a McEliece-like cryptosystem implementation using \textit{rank metric} instead of Hamming distance. Namely, we use the scheme proposed by Loidreau i...
On Hardware Implementation of Tang-Maitra Boolean Functions
Boolean Functions Bent Functions Cryptology
2018/7/16
In this paper, we investigate the hardware circuit complexity of the class of Boolean functions recently introduced by Tang and Maitra (IEEE-TIT 64(1): 393 402, 2018). While this class of functions ha...
IMPLEMENTATION OF A COMPREHENSIVE AND EFFECTIVE GEOPROCESSING WORKFLOW ENVIRONMENT
Workflow Geoprocessing Remote Sensing Earth Observation
2018/11/8
Many projects and research efforts implement geo-information (GI) workflows, ranging from very basic ones to complicated software processing chains. The creation of these workflows normally needs cons...