نتایج جستجو برای: box key
تعداد نتایج: 632676 فیلتر نتایج به سال:
Background This technical report describes implementation of the ideas explained in [1], mainly done in the jmltest package in KeY and referred to as JML-Test. JMLTest is used to enrich an existing specification of a method with structural information of the methods body. The enriched specification is written to a file with JML annotations. The objective is to use a blackbox testing tool with t...
In this paper we present new S8 S-boxes by using the action of symmetric group S8 on Advanced Encryption Standard S-box [3,] and use these S-boxes to construct 40320 keys. We apply these keys to Advanced Encryption Standard and propose a key exchange communication algorithm to make it more secure. This algorithm is suitable to exchange keys on insecure communication channels in order to achieve...
We propose to use deductive program verification systems to generate specifications for given programs and to then use these specifications as input for black-box testing tools. In this way, (1) the black-box testing method can make use of information about the program’s structure that is contained in the specification, and (2) we get a separation of concerns and a clear interface between progr...
Many deployed learned models are black boxes: given input, returns output. Internal information about the model, such as the architecture, optimisation procedure, or training data, is not disclosed explicitly as it might contain proprietary information or make the system more vulnerable. This work shows that such attributes of neural networks can be exposed from a sequence of queries. This has ...
An overlay-based IPTV content delivery is a relatively new type of content delivery in which user devices such as set-top boxes are connected with one another to form a dynamic, virtual delivery path. In the network, each overlay node forwards data, which one has received from another overlay node. To ensure security of the IPTV content delivered through the overlay, we propose a new key manage...
An Order-Revealing Encryption (ORE) scheme gives a public procedure by which two ciphertext can be compared to reveal the order of their underlying plaintexts. The ideal security notion for ORE is that only the order is revealed — anything else, such as the distance between plaintexts, is hidden. The only known constructions of ORE achieving such ideal security are based on cryptographic multil...
Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CRYPTO 2013), are a framework of assumptions on hash functions that allow to instantiate random oracles in a large variety of settings. Brzuska, Farshim and Mittelbach (CRYPTO 2014) showed that a large class of UCE assumptions with computationally unpredictable sources cannot be achieved, if indistinguishabi...
In the context of secure content distribution, the content is encrypted and then broadcasted in a public channel, each legitimate user is provided a decoder and a secret key for decrypting the received signals. One of the main threat for such a system is that the decoder can be cloned and then sold out with the pirate secret keys. Traitor tracing allows the authority to identify the malicious u...
This work presents a novel low-cost optoelectronic setup for timeand spatially resolved analysis of photonic emissions and a corresponding methodology, Simple Photonic Emission Analysis (SPEA). Observing the backside of ICs, the system captures extremly weak photoemissions from switching transistors and relates them to program running in the chip. SPEA utilizes both spatial and temporal informa...
We introduce a new technique for doing the key recovery part of an integral or higher order differential attack. This technique speeds up the key recovery phase significantly and can be applied to any block cipher with S-boxes. We show several properties of this technique, then apply it to PRINCE and report on the improvements in complexity from earlier integral and higher order differential at...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید