搜索结果: 1-8 共查到“军事学 really”相关记录8条 . 查询时间(0.011 秒)
How many transactions per second can bitcoin really handle ? Theoretically.
maximal throughput bitcoin protocol blockchain
2019/4/25
Transactions are arguably the most important part in the bitcoin mechanism, with everything else facilitating the proper creation, propagation and validation; culminating with their addition to the pu...
"Make Sure DSA Signing Exponentiations Really are Constant-Time''
applied cryptography digital signatures side-channel analysis
2016/6/8
TLS and SSH are two of the most commonly used protocols for securing Internet traffic. Many of the implementations of these protocols rely on the cryptographic primitives provided in the OpenSSL libra...
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
DSA ECDSA Timing Attacks
2015/12/23
In 2011, B.B.Brumley and N.Tuveri found a remote timing attack
on OpenSSL’s ECDSA implementation for binary curves. We will
study if the title of their paper was indeed relevant (Remote Timing
Atta...
Really fast syndrome-based hashing
secret-key cryptography / compression functions collision resistance
2012/3/29
The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs proposed in 2003, 2005, and 2007....
Really fast syndrome-based hashing
compression functions collision resistance linearization generalized birthday attacks information-set decoding
2011/2/23
The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs proposed in 2003, 2005, and 2007....
Privacy-Preserving Sharing of Sensitive Information is (Really) Practical
Privacy-Preserving Sensitive Information
2010/9/9
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social networks). A typical scen...
A provably secure really source hiding designated verifier signature scheme based on random oracle model
DVS secure hash functions random oracle
2009/7/22
A lot of designated verifier signature (DVS) schemes have been proposed. However, all of them only provide the basic security requirement that only the designated verifier can check the validity of th...
In their best-selling book, The Coming Conflict with China, Richard Bernstein and Ross H. Munro sketch out a frightening but all too plausible scenario. It is 2004; after a major, decade-long campaign...