随笔分类 - Cyber Security
摘要:
52 Things: Number 33: How does the Bellcore attack work against RSA with CRT?
阅读全文

摘要:
52 Things: Number 32: difference between game-based and simulation-based security definitions
阅读全文

摘要:
52 Things: Number 31: Game Hopping Proof
阅读全文

摘要:
52 Things: Number 30: Roughly outline the BR security definition for key agreement
阅读全文

摘要:
52 Things: Number 29: What is the UF-CMA security definition for digital signatures?
阅读全文

摘要:
52 Things: Number 28: What is the IND-CCA security definition for public key encryption?
阅读全文

摘要:
52 Things: Number 27: What is the AEAD security definition for symmetric key encryption?
阅读全文

摘要:
52 Things: Number 26: Describe the NAF scalar multiplication algorithm.
阅读全文

摘要:
52 Things: Number 25: Methods for modular reduction using "special" primes that define GF(p) and GF(2^n)
阅读全文

摘要:
52 Things: Number 24: Describe the binary, m-ary and sliding window exponentiation algorithms.
阅读全文

摘要:
52 Things: Number 23: Write a C program to implement Montgomery arithmetic.
阅读全文

摘要:
52 Things: Number 22: How do you represent a number and multiply numbers in Montgomery arithmetic?
阅读全文

摘要:
52 Things: Number 21: How does the CRT method improve performance of RSA?
阅读全文

摘要:
52 Things: Number 20: How are Merkle-Damgaard style hash functions constructed?
阅读全文

摘要:
52 Things: Number 19: The Shamir secret sharing scheme.
阅读全文

摘要:
52 Things: Number 18: Draw a diagram (or describe) the ECB, CBC and CTR modes of operation
阅读全文

摘要:
52 Things: Number 17: Describe and compare the round structure of DES and AES.
阅读全文

摘要:
52 Things: Number 16: Describe the key generation, signature and verification algorithms for DSA, Schnorr and RSA-FDH.
阅读全文

摘要:
52 Things: Number 15: Key generation, encryption and decryption algorithms for RSA-OAEP and ECIES.
阅读全文

摘要:
52 Things: Number 14: What is a cryptographic pairing?
阅读全文
