摘要:
52 Things: Number 35: Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP. 阅读全文
摘要:
52 Things: Number 34: Describe the Baby-Step/Giant-Step method for breaking DLPs 阅读全文
摘要:
52 Things: Number 33: How does the Bellcore attack work against RSA with CRT? 阅读全文
摘要:
52 Things: Number 32: difference between game-based and simulation-based security definitions 阅读全文
摘要:
52 Things: Number 31: Game Hopping Proof 阅读全文
摘要:
52 Things: Number 30: Roughly outline the BR security definition for key agreement 阅读全文
摘要:
52 Things: Number 29: What is the UF-CMA security definition for digital signatures? 阅读全文
摘要:
52 Things: Number 28: What is the IND-CCA security definition for public key encryption? 阅读全文
摘要:
52 Things: Number 27: What is the AEAD security definition for symmetric key encryption? 阅读全文