随笔分类 - Bristol Cryptography Blog
转载:
https://bristolcrypto.blogspot.com/
A blog for the cryptography group of the University of Bristol. To enable discussion on cryptography and other matters related to our research.
布里斯托大学密码学小组的博客。以便讨论密码学和与我们研究相关的其他事项。
摘要:
52 Things: Number 52: Pick an advanced application concept such as e-Voting, Auctions or Multi-Party Computation. What are the rough security requirements of such a system?
阅读全文

摘要:
52 Things: Number 51: What is the security model for ID-based encryption, and describe one IBE scheme.
阅读全文

摘要:
52 Things: Number 50: What is the BLS pairing-based signature scheme?
阅读全文

摘要:
52 Things: Number 49: Describe the basic ideas behind IPSec and TLS.
阅读全文

摘要:
52 Things: Number 48: What is the purpose and use of a TPM?
阅读全文

摘要:
52 Things: Number 47: What is the Fiat-Shamir transform?
阅读全文

摘要:
52 Things: Number 46: What do correctness, soundness and zero-knowledge mean in the context of a Sigma protocol?
阅读全文

摘要:
52 Things: Number 45: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for RSA.
阅读全文

摘要:
52 Things: Number 44: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for ECC.
阅读全文

摘要:
52 Things: Number 43: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for AES
阅读全文

摘要:
52 Things: Number 42: Look at your C code for Montgomery multiplication above; can you determine where it could leak side channel information?
阅读全文

摘要:
52 Things: Number 41: Are all side-channels related to power analysis?
阅读全文

摘要:
52 Things: Number 40: What is normally considered the difference between SPA and DPA?
阅读全文

摘要:
52 Things: Number 39: What is the difference between a side-channel attack and a fault attack?
阅读全文

摘要:
52 Things: Number 38: What is the difference between a covert channel and a side-channel?
阅读全文

摘要:
52 Things: Number 37: The Number Field Sieve
阅读全文

摘要:
52 Things: Number 36: Index Calculus Algorithm
阅读全文

摘要:
52 Things: Number 35: Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP.
阅读全文

摘要:
52 Things: Number 34: Describe the Baby-Step/Giant-Step method for breaking DLPs
阅读全文

摘要:
52 Things: Number 33: How does the Bellcore attack work against RSA with CRT?
阅读全文
