-
1
Cryptographic Censorship
Published 2025-01-01“…Abstract We formulate and take two large strides towards proving a quantum version of the weak cosmic censorship conjecture. We first prove “Cryptographic Censorship”: a theorem showing that when the time evolution operator of a holographic CFT is approximately pseudorandom (or Haar random) on some code subspace, then there must be an event horizon in the corresponding bulk dual. …”
Get full text
Article -
2
-
3
Cryptographic secrecy of steganographic matrix encoding
Published 2012-06-01“…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
Get full text
Article -
4
Monitoring approach for online security of cryptographic protocol
Published 2016-06-01Subjects: “…cryptographic protocol identification…”
Get full text
Article -
5
Construction and analysis of one class of cryptographic functions
Published 2013-04-01Subjects: “…cryptographic functions…”
Get full text
Article -
6
Research on semantics of trust transitivity in cryptographic primitives
Published 2008-01-01Subjects: “…cryptographic primitives…”
Get full text
Article -
7
-
8
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01“…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
Get full text
Article -
9
INFORMATIVE DESCRIPTORS FOR STATISTICAL RECOGNITION OF CRYPTOGRAPHIC GENERATORS
Published 2016-10-01“…An approach to developing informative descriptors for solving the problem of statistical recognition of cryptographic generators is proposed. The descriptors developed by this approach are given. …”
Get full text
Article -
10
-
11
HDFS-oriented cryptographic key resource control mechanism
Published 2022-09-01Subjects: Get full text
Article -
12
Blind mask template attacks on masked cryptographic algorithm
Published 2019-01-01“…Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information.Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase.This requirement not only increase the prerequisite of template attacking,but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices,which might degrade performance in real world attacking.Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces,and then uses these templates to attack masked cryptographic devices.Both traditional Gaussian distribution and neural network were adopted as the templates in experiments.Experimental results verified the feasibility of this new approach.The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.…”
Get full text
Article -
13
On-demand and efficient scheduling scheme for cryptographic service resource
Published 2022-06-01Subjects: “…cryptographic resource…”
Get full text
Article -
14
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01Subjects: Get full text
Article -
15
Linear property and optimal design of MARS-like cryptographic structure
Published 2021-04-01Subjects: “…MARS-like cryptographic structure…”
Get full text
Article -
16
Accelerating cryptographic computation with parallel computing mechanisms in Android platform
Published 2019-02-01Subjects: Get full text
Article -
17
Multi-language oriented automatic realization method for cryptographic protocols
Published 2012-09-01Get full text
Article -
18
On a clock-controlled keystream generator and its cryptographic properties
Published 2007-01-01Get full text
Article -
19
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01Subjects: Get full text
Article -
20
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
Published 2021-08-01Subjects: “…dynamic cryptographic structure…”
Get full text
Article