上一页 1 2 3 4 5 6 7 8 ··· 23 下一页
摘要: 52 Things: Number 35: Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP. 52 Things: Number 35: Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP. 阅读全文
posted @ 2024-04-12 21:35 3cH0_Nu1L 阅读(26) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 34: Describe the Baby-Step/Giant-Step method for breaking DLPs 52 Things: Number 34: Describe the Baby-Step/Giant-Step method for breaking DLPs 阅读全文
posted @ 2024-04-12 21:34 3cH0_Nu1L 阅读(15) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 33: How does the Bellcore attack work against RSA with CRT? 52 Things: Number 33: How does the Bellcore attack work against RSA with CRT? 阅读全文
posted @ 2024-04-12 21:33 3cH0_Nu1L 阅读(8) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 32: difference between game-based and simulation-based security definitions 52 Things: Number 32: difference between game-based and simulation-based security definitions 阅读全文
posted @ 2024-04-12 21:32 3cH0_Nu1L 阅读(23) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 31: Game Hopping Proof 52 Things: Number 31: Game Hopping Proof 阅读全文
posted @ 2024-04-12 21:32 3cH0_Nu1L 阅读(30) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 30: Roughly outline the BR security definition for key agreement 52 Things: Number 30: Roughly outline the BR security definition for key agreement 阅读全文
posted @ 2024-04-12 21:30 3cH0_Nu1L 阅读(19) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 29: What is the UF-CMA security definition for digital signatures? 52 Things: Number 29: What is the UF-CMA security definition for digital signatures? 阅读全文
posted @ 2024-04-12 21:28 3cH0_Nu1L 阅读(22) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 28: What is the IND-CCA security definition for public key encryption? 52 Things: Number 28: What is the IND-CCA security definition for public key encryption? 阅读全文
posted @ 2024-04-12 21:26 3cH0_Nu1L 阅读(32) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 27: What is the AEAD security definition for symmetric key encryption? 52 Things: Number 27: What is the AEAD security definition for symmetric key encryption? 阅读全文
posted @ 2024-04-12 21:25 3cH0_Nu1L 阅读(15) 评论(0) 推荐(0) 编辑
摘要: 52 Things: Number 26: Describe the NAF scalar multiplication algorithm. 52 Things: Number 26: Describe the NAF scalar multiplication algorithm. 阅读全文
posted @ 2024-04-11 23:35 3cH0_Nu1L 阅读(40) 评论(0) 推荐(0) 编辑
上一页 1 2 3 4 5 6 7 8 ··· 23 下一页