随笔分类 -  Cyber Security

摘要:52 Things: Number 33: How does the Bellcore attack work against RSA with CRT?52 Things: Number 33: How does the Bellcore attack work against RSA with CRT? 阅读全文
posted @ 2024-04-12 21:33 3cH0_Nu1L 阅读(20) 评论(0) 推荐(0)
摘要:52 Things: Number 32: difference between game-based and simulation-based security definitions52 Things: Number 32: difference between game-based and simulation-based security definitions 阅读全文
posted @ 2024-04-12 21:32 3cH0_Nu1L 阅读(70) 评论(0) 推荐(0)
摘要:52 Things: Number 31: Game Hopping Proof52 Things: Number 31: Game Hopping Proof 阅读全文
posted @ 2024-04-12 21:32 3cH0_Nu1L 阅读(80) 评论(0) 推荐(0)
摘要:52 Things: Number 30: Roughly outline the BR security definition for key agreement52 Things: Number 30: Roughly outline the BR security definition for key agreement 阅读全文
posted @ 2024-04-12 21:30 3cH0_Nu1L 阅读(34) 评论(0) 推荐(0)
摘要:52 Things: Number 29: What is the UF-CMA security definition for digital signatures?52 Things: Number 29: What is the UF-CMA security definition for digital signatures? 阅读全文
posted @ 2024-04-12 21:28 3cH0_Nu1L 阅读(57) 评论(0) 推荐(0)
摘要:52 Things: Number 28: What is the IND-CCA security definition for public key encryption?52 Things: Number 28: What is the IND-CCA security definition for public key encryption? 阅读全文
posted @ 2024-04-12 21:26 3cH0_Nu1L 阅读(56) 评论(0) 推荐(0)
摘要:52 Things: Number 27: What is the AEAD security definition for symmetric key encryption?52 Things: Number 27: What is the AEAD security definition for symmetric key encryption? 阅读全文
posted @ 2024-04-12 21:25 3cH0_Nu1L 阅读(30) 评论(0) 推荐(0)
摘要:52 Things: Number 26: Describe the NAF scalar multiplication algorithm.52 Things: Number 26: Describe the NAF scalar multiplication algorithm. 阅读全文
posted @ 2024-04-11 23:35 3cH0_Nu1L 阅读(83) 评论(0) 推荐(0)
摘要:52 Things: Number 25: Methods for modular reduction using "special" primes that define GF(p) and GF(2^n)52 Things: Number 25: Methods for modular reduction using "special" primes that define GF(p) and GF(2^n) 阅读全文
posted @ 2024-04-11 23:35 3cH0_Nu1L 阅读(40) 评论(0) 推荐(0)
摘要:52 Things: Number 24: Describe the binary, m-ary and sliding window exponentiation algorithms.52 Things: Number 24: Describe the binary, m-ary and sliding window exponentiation algorithms. 阅读全文
posted @ 2024-04-11 23:32 3cH0_Nu1L 阅读(40) 评论(0) 推荐(0)
摘要:52 Things: Number 23: Write a C program to implement Montgomery arithmetic.52 Things: Number 23: Write a C program to implement Montgomery arithmetic. 阅读全文
posted @ 2024-04-11 23:31 3cH0_Nu1L 阅读(26) 评论(0) 推荐(0)
摘要:52 Things: Number 22: How do you represent a number and multiply numbers in Montgomery arithmetic?52 Things: Number 22: How do you represent a number and multiply numbers in Montgomery arithmetic? 阅读全文
posted @ 2024-04-11 23:30 3cH0_Nu1L 阅读(13) 评论(0) 推荐(0)
摘要:52 Things: Number 21: How does the CRT method improve performance of RSA?52 Things: Number 21: How does the CRT method improve performance of RSA? 阅读全文
posted @ 2024-04-11 23:29 3cH0_Nu1L 阅读(20) 评论(0) 推荐(0)
摘要:52 Things: Number 20: How are Merkle-Damgaard style hash functions constructed?52 Things: Number 20: How are Merkle-Damgaard style hash functions constructed? 阅读全文
posted @ 2024-04-11 23:28 3cH0_Nu1L 阅读(22) 评论(0) 推荐(0)
摘要:52 Things: Number 19: The Shamir secret sharing scheme.52 Things: Number 19: The Shamir secret sharing scheme. 阅读全文
posted @ 2024-04-11 23:26 3cH0_Nu1L 阅读(52) 评论(0) 推荐(0)
摘要:52 Things: Number 18: Draw a diagram (or describe) the ECB, CBC and CTR modes of operation52 Things: Number 18: Draw a diagram (or describe) the ECB, CBC and CTR modes of operation 阅读全文
posted @ 2024-04-11 23:25 3cH0_Nu1L 阅读(28) 评论(0) 推荐(0)
摘要:52 Things: Number 17: Describe and compare the round structure of DES and AES.52 Things: Number 17: Describe and compare the round structure of DES and AES. 阅读全文
posted @ 2024-04-11 23:24 3cH0_Nu1L 阅读(33) 评论(0) 推荐(0)
摘要:52 Things: Number 16: Describe the key generation, signature and verification algorithms for DSA, Schnorr and RSA-FDH.52 Things: Number 16: Describe the key generation, signature and verification algorithms for DSA, Schnorr and RSA-FDH. 阅读全文
posted @ 2024-04-11 23:23 3cH0_Nu1L 阅读(38) 评论(0) 推荐(0)
摘要:52 Things: Number 15: Key generation, encryption and decryption algorithms for RSA-OAEP and ECIES.52 Things: Number 15: Key generation, encryption and decryption algorithms for RSA-OAEP and ECIES. 阅读全文
posted @ 2024-04-11 23:22 3cH0_Nu1L 阅读(35) 评论(0) 推荐(0)
摘要:52 Things: Number 14: What is a cryptographic pairing?52 Things: Number 14: What is a cryptographic pairing? 阅读全文
posted @ 2024-04-11 23:20 3cH0_Nu1L 阅读(37) 评论(0) 推荐(0)