随笔分类 - Cryptography
摘要:
52 Things: Number 32: difference between game-based and simulation-based security definitions
阅读全文

摘要:
52 Things: Number 31: Game Hopping Proof
阅读全文

摘要:
52 Things: Number 30: Roughly outline the BR security definition for key agreement
阅读全文

摘要:
52 Things: Number 29: What is the UF-CMA security definition for digital signatures?
阅读全文

摘要:
52 Things: Number 28: What is the IND-CCA security definition for public key encryption?
阅读全文

摘要:
52 Things: Number 27: What is the AEAD security definition for symmetric key encryption?
阅读全文

摘要:
52 Things: Number 26: Describe the NAF scalar multiplication algorithm.
阅读全文

摘要:
52 Things: Number 25: Methods for modular reduction using "special" primes that define GF(p) and GF(2^n)
阅读全文

摘要:
52 Things: Number 24: Describe the binary, m-ary and sliding window exponentiation algorithms.
阅读全文

摘要:
52 Things: Number 23: Write a C program to implement Montgomery arithmetic.
阅读全文

摘要:
52 Things: Number 22: How do you represent a number and multiply numbers in Montgomery arithmetic?
阅读全文
