摘要:
52 Things: Number 39: What is the difference between a side-channel attack and a fault attack? 阅读全文
52 Things: Number 39: What is the difference between a side-channel attack and a fault attack? 阅读全文
posted @ 2024-04-12 21:40
3cH0_Nu1L
阅读(34)
评论(0)
推荐(0)
摘要:
52 Things: Number 38: What is the difference between a covert channel and a side-channel? 阅读全文
52 Things: Number 38: What is the difference between a covert channel and a side-channel? 阅读全文
posted @ 2024-04-12 21:40
3cH0_Nu1L
阅读(36)
评论(0)
推荐(0)
摘要:
52 Things: Number 37: The Number Field Sieve 阅读全文
52 Things: Number 37: The Number Field Sieve 阅读全文
posted @ 2024-04-12 21:39
3cH0_Nu1L
阅读(59)
评论(0)
推荐(0)
摘要:
52 Things: Number 36: Index Calculus Algorithm 阅读全文
52 Things: Number 36: Index Calculus Algorithm 阅读全文
posted @ 2024-04-12 21:38
3cH0_Nu1L
阅读(59)
评论(0)
推荐(0)
摘要:
52 Things: Number 35: Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP. 阅读全文
52 Things: Number 35: Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP. 阅读全文
posted @ 2024-04-12 21:35
3cH0_Nu1L
阅读(128)
评论(0)
推荐(0)
摘要:
52 Things: Number 34: Describe the Baby-Step/Giant-Step method for breaking DLPs 阅读全文
52 Things: Number 34: Describe the Baby-Step/Giant-Step method for breaking DLPs 阅读全文
posted @ 2024-04-12 21:34
3cH0_Nu1L
阅读(39)
评论(0)
推荐(0)
摘要:
52 Things: Number 33: How does the Bellcore attack work against RSA with CRT? 阅读全文
52 Things: Number 33: How does the Bellcore attack work against RSA with CRT? 阅读全文
posted @ 2024-04-12 21:33
3cH0_Nu1L
阅读(20)
评论(0)
推荐(0)
摘要:
52 Things: Number 32: difference between game-based and simulation-based security definitions 阅读全文
52 Things: Number 32: difference between game-based and simulation-based security definitions 阅读全文
posted @ 2024-04-12 21:32
3cH0_Nu1L
阅读(74)
评论(0)
推荐(0)
摘要:
52 Things: Number 31: Game Hopping Proof 阅读全文
52 Things: Number 31: Game Hopping Proof 阅读全文
posted @ 2024-04-12 21:32
3cH0_Nu1L
阅读(80)
评论(0)
推荐(0)
摘要:
52 Things: Number 30: Roughly outline the BR security definition for key agreement 阅读全文
52 Things: Number 30: Roughly outline the BR security definition for key agreement 阅读全文
posted @ 2024-04-12 21:30
3cH0_Nu1L
阅读(44)
评论(0)
推荐(0)
摘要:
52 Things: Number 29: What is the UF-CMA security definition for digital signatures? 阅读全文
52 Things: Number 29: What is the UF-CMA security definition for digital signatures? 阅读全文
posted @ 2024-04-12 21:28
3cH0_Nu1L
阅读(61)
评论(0)
推荐(0)
摘要:
52 Things: Number 28: What is the IND-CCA security definition for public key encryption? 阅读全文
52 Things: Number 28: What is the IND-CCA security definition for public key encryption? 阅读全文
posted @ 2024-04-12 21:26
3cH0_Nu1L
阅读(59)
评论(0)
推荐(0)
摘要:
52 Things: Number 27: What is the AEAD security definition for symmetric key encryption? 阅读全文
52 Things: Number 27: What is the AEAD security definition for symmetric key encryption? 阅读全文
posted @ 2024-04-12 21:25
3cH0_Nu1L
阅读(33)
评论(0)
推荐(0)

浙公网安备 33010602011771号