随笔分类 - Cryptography
摘要:
转载自:
https://asiacrypt.iacr.org/2024/acceptedpapers.php
阅读全文

摘要:
转载自:
https://eurocrypt.iacr.org/2024/acceptedpapers.php
阅读全文

摘要:
转载自:
https://crypto.iacr.org/2024/acceptedpapers.php
阅读全文

摘要:
52 Things: Number 52: Pick an advanced application concept such as e-Voting, Auctions or Multi-Party Computation. What are the rough security requirements of such a system?
阅读全文

摘要:
52 Things: Number 51: What is the security model for ID-based encryption, and describe one IBE scheme.
阅读全文

摘要:
52 Things: Number 50: What is the BLS pairing-based signature scheme?
阅读全文

摘要:
52 Things: Number 49: Describe the basic ideas behind IPSec and TLS.
阅读全文

摘要:
52 Things: Number 48: What is the purpose and use of a TPM?
阅读全文

摘要:
52 Things: Number 47: What is the Fiat-Shamir transform?
阅读全文

摘要:
52 Things: Number 46: What do correctness, soundness and zero-knowledge mean in the context of a Sigma protocol?
阅读全文

摘要:
52 Things: Number 45: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for RSA.
阅读全文

摘要:
52 Things: Number 44: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for ECC.
阅读全文

摘要:
52 Things: Number 43: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for AES
阅读全文

摘要:
52 Things: Number 42: Look at your C code for Montgomery multiplication above; can you determine where it could leak side channel information?
阅读全文

摘要:
52 Things: Number 41: Are all side-channels related to power analysis?
阅读全文

摘要:
52 Things: Number 40: What is normally considered the difference between SPA and DPA?
阅读全文

摘要:
52 Things: Number 39: What is the difference between a side-channel attack and a fault attack?
阅读全文

摘要:
52 Things: Number 38: What is the difference between a covert channel and a side-channel?
阅读全文

摘要:
52 Things: Number 37: The Number Field Sieve
阅读全文

摘要:
52 Things: Number 36: Index Calculus Algorithm
阅读全文
