随笔分类 - Cryptography
摘要:
52 Things: Number 52: Pick an advanced application concept such as e-Voting, Auctions or Multi-Party Computation. What are the rough security requirements of such a system?
阅读全文

摘要:
52 Things: Number 51: What is the security model for ID-based encryption, and describe one IBE scheme.
阅读全文

摘要:
52 Things: Number 50: What is the BLS pairing-based signature scheme?
阅读全文

摘要:
52 Things: Number 49: Describe the basic ideas behind IPSec and TLS.
阅读全文

摘要:
52 Things: Number 48: What is the purpose and use of a TPM?
阅读全文

摘要:
52 Things: Number 47: What is the Fiat-Shamir transform?
阅读全文

摘要:
52 Things: Number 46: What do correctness, soundness and zero-knowledge mean in the context of a Sigma protocol?
阅读全文

摘要:
52 Things: Number 45: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for RSA.
阅读全文

摘要:
52 Things: Number 44: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for ECC.
阅读全文

摘要:
52 Things: Number 43: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for AES
阅读全文

摘要:
52 Things: Number 42: Look at your C code for Montgomery multiplication above; can you determine where it could leak side channel information?
阅读全文
