摘要:
52 Things: Number 52: Pick an advanced application concept such as e-Voting, Auctions or Multi-Party Computation. What are the rough security requirements of such a system? 阅读全文
摘要:
52 Things: Number 51: What is the security model for ID-based encryption, and describe one IBE scheme. 阅读全文
摘要:
52 Things: Number 50: What is the BLS pairing-based signature scheme? 阅读全文
摘要:
52 Things: Number 49: Describe the basic ideas behind IPSec and TLS. 阅读全文
摘要:
52 Things: Number 48: What is the purpose and use of a TPM? 阅读全文
摘要:
52 Things: Number 47: What is the Fiat-Shamir transform? 阅读全文
摘要:
52 Things: Number 46: What do correctness, soundness and zero-knowledge mean in the context of a Sigma protocol? 阅读全文
摘要:
52 Things: Number 45: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for RSA. 阅读全文
摘要:
52 Things: Number 44: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for ECC. 阅读全文
摘要:
52 Things: Number 43: Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for AES 阅读全文
摘要:
52 Things: Number 42: Look at your C code for Montgomery multiplication above; can you determine where it could leak side channel information? 阅读全文
摘要:
52 Things: Number 41: Are all side-channels related to power analysis? 阅读全文
摘要:
52 Things: Number 40: What is normally considered the difference between SPA and DPA? 阅读全文