نتایج جستجو برای: box key

تعداد نتایج: 632676  

2008
Markus Bender

Background This technical report describes implementation of the ideas explained in [1], mainly done in the jmltest package in KeY and referred to as JML-Test. JMLTest is used to enrich an existing specification of a method with structural information of the methods body. The enriched specification is written to a file with JML annotations. The objective is to use a blackbox testing tool with t...

2010
Iqtadar Hussain Tariq Shah

In this paper we present new S8 S-boxes by using the action of symmetric group S8 on Advanced Encryption Standard S-box [3,] and use these S-boxes to construct 40320 keys. We apply these keys to Advanced Encryption Standard and propose a key exchange communication algorithm to make it more secure. This algorithm is suitable to exchange keys on insecure communication channels in order to achieve...

2007
Bernhard Beckert Christoph Gladisch

We propose to use deductive program verification systems to generate specifications for given programs and to then use these specifications as input for black-box testing tools. In this way, (1) the black-box testing method can make use of information about the program’s structure that is contained in the specification, and (2) we get a separation of concerns and a clear interface between progr...

Journal: :CoRR 2017
Seong Joon Oh Max Augustin Bernt Schiele Mario Fritz

Many deployed learned models are black boxes: given input, returns output. Internal information about the model, such as the architecture, optimisation procedure, or training data, is not disclosed explicitly as it might contain proprietary information or make the system more vulnerable. This work shows that such attributes of neural networks can be exposed from a sequence of queries. This has ...

2009
Jabeom Gu Jaehoon Nah

An overlay-based IPTV content delivery is a relatively new type of content delivery in which user devices such as set-top boxes are connected with one another to form a dynamic, virtual delivery path. In the network, each overlay node forwards data, which one has received from another overlay node. To ensure security of the IPTV content delivered through the overlay, we propose a new key manage...

Journal: :IACR Cryptology ePrint Archive 2017
Mark Zhandry Cong Zhang

An Order-Revealing Encryption (ORE) scheme gives a public procedure by which two ciphertext can be compared to reveal the order of their underlying plaintexts. The ideal security notion for ORE is that only the order is revealed — anything else, such as the distance between plaintexts, is hidden. The only known constructions of ORE achieving such ideal security are based on cryptographic multil...

Journal: :IACR Cryptology ePrint Archive 2015
Christina Brzuska Arno Mittelbach

Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CRYPTO 2013), are a framework of assumptions on hash functions that allow to instantiate random oracles in a large variety of settings. Brzuska, Farshim and Mittelbach (CRYPTO 2014) showed that a large class of UCE assumptions with computationally unpredictable sources cannot be achieved, if indistinguishabi...

2013
Philippe Guillot Abdelkrim Nimour Duong Hieu Phan Viet Cuong Trinh

In the context of secure content distribution, the content is encrypted and then broadcasted in a public channel, each legitimate user is provided a decoder and a secret key for decrypting the received signals. One of the main threat for such a system is that the decoder can be cloned and then sold out with the pirate secret keys. Traitor tracing allows the authority to identify the malicious u...

2012
Alexander Schlösser Dmitry Nedospasov Juliane Krämer Susanna Orlic Jean-Pierre Seifert

This work presents a novel low-cost optoelectronic setup for timeand spatially resolved analysis of photonic emissions and a corresponding methodology, Simple Photonic Emission Analysis (SPEA). Observing the backside of ICs, the system captures extremly weak photoemissions from switching transistors and relates them to program running in the chip. SPEA utilizes both spatial and temporal informa...

Journal: :IACR Cryptology ePrint Archive 2016
Shahram Rasoolzadeh Håvard Raddum

We introduce a new technique for doing the key recovery part of an integral or higher order differential attack. This technique speeds up the key recovery phase significantly and can be applied to any block cipher with S-boxes. We show several properties of this technique, then apply it to PRINCE and report on the improvements in complexity from earlier integral and higher order differential at...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید