搜索结果: 121-135 共查到“implementation”相关记录687条 . 查询时间(0.052 秒)
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
Searchable Encryption Data Structures
2016/1/6
We design and implement dynamic symmetric searchable encryption schemes that efficiently and
privately search server-held encrypted databases with tens of billions of record-keyword pairs. Our
basic...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
implementation Secret sharing
2016/1/6
Shamir’s secret sharing scheme is an effective way to distribute secret to a group of
shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect
the system from ch...
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
power analysis attack LEA ARX
2016/1/5
The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for s...
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Reduced-Precision Residue Number System Residue Number System (RNS) modular exponentiation
2016/1/5
We built and tested the first hardware implementation of Phatak’s Quotient-First Scaling (QFS) algorithm in the reduced-precision residue number system (RP-RNS). This algorithm is designed to expedite...
Silent Simon: A Threshold Implementation under 100 Slices
provable arguments leakage quantification
2016/1/3
Lightweight Cryptography aims at achieving security comparable
to conventional cryptography at a much lower cost. Simon is
a lightweight alternative to AES, as it shares same cryptographic parameter...
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
symmetric ciphers cryptographic properties
2016/1/3
Linear mappings are crucial components of symmetric ciphers. A
special type of linear mappings are (0,1)-matrices which have been used in
symmetric ciphers such as ARIA, E2 and Camellia as diffusion...
Toward Secure Implementation of McEliece Decryption
McEliece Extended Euclidean Algorithm timing attacks
2016/1/3
We analyse the security regarding timing attacks of implementations
of the decryption in McEliece PKC with binary Goppa codes.
First, we review and extend the existing attacks, both on the messages
...
DESIGN AND IMPLEMENTATION OF INFORMATION SHARING PLATFORM OF LAND AND RESOURCES
Land and Resources Information Sharing Platform
2015/12/31
With the development of land and resources informatization, huge amounts of information resources has accumulated, but data between different departments is hard to share and utilize, the unitary effe...
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
cryptanalysis digital signatures implementation
2015/12/31
This paper describes a bug in the implementation of the RabinWilliams
digital signature in the Crypto++ framework. The bug is in
the misuse of blinding technique that is aimed at preventing timing
...
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Multiple-precision arithmetic Pseudo-Mersenne prime
2015/12/30
The verification of an ECDSA signature requires a double-base scalar multiplication, an operation of the form k⋅G+l⋅Q where G is a generator of a large elliptic curve group of prime order ...
On the Implementation of Unified Arithmetic on Binary Huff Curves
Elliptic curves Binary fields Side-channel
2015/12/30
Unified formula for computing elliptic curve point addition
and doubling are considered to be resistant against simple power-analysis
attack. A new elliptic curve formula known as unified binary Huf...
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Vector instructions ARM-NEON RSA
2015/12/30
Advanced modern processors support Single Instruction Multiple
Data (SIMD) instructions (e.g. Intel-AVX, ARM-NEON) and a
massive body of research on vector-parallel implementations of modular
arith...
DESIGN AND IMPLEMENTATION OF A COASTAL WEB ATLAS (CWA) FOR THE INTEGRATED COASTAL ZONE MANAGEMENT OF JIANGSU,CHINA
Coastal Web based GIS Mapping Visualization
2015/12/29
In Section 1, the background of the research is introduced. The Jiangsu Coastal Web Atlas is a project that has the ambitious goal of being a useful resource for the various audiences that make up the...
DESIGN AND IMPLEMENTATION OF MOBILE SPATIAL INFORMATION SYSTEM FOR PUBLIC HEALTH EMERGENCY
Public Health Emergency Mobile Geographic Information System Personal Digital Assistant Global Positioning System Emergency Response Disposition Mobile Collaboration
2015/12/28
At present, as mobile devices like Personal Digital Assistant (PDA) or Handheld PC (HPC) are rapidly developed and the wireless Internet is increasingly used, interests in the mobile Geographic Inform...