搜索结果: 1-4 共查到“军事学 YEARS”相关记录4条 . 查询时间(0.229 秒)
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
public-key cryptography cryptanalysis
2018/3/15
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is app...
Turing's theory of morphogenesis validated 60 years after his death(图)
60 years morphogenesis
2014/3/20
PITTSBURGH—British mathematician Alan Turing’s accomplishments in computer science are well known—he’s the man who cracked the German Enigma code, expediting the Allies’ victory in World War II. He al...
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
information security side channel attack cryptographic module
2009/3/13
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. Thes...
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
PEKE Probabilistic Encryption Key Exchange PEKEv1.25 Specifications
2009/2/12
This document revisits the PEKE (Probabilistic Encryption Key Exchange) cryptosystem
and proposes the enhanced PEKEv1.25 that performs a hash computation on the original PEKE
output in order to impr...