搜索结果: 1-7 共查到“军事学 wild”相关记录7条 . 查询时间(0.152 秒)
In search of CurveSwap: Measuring elliptic curve implementations in the wild
elliptic curve cryptography invalid curve attack curveswap
2018/3/30
We survey elliptic curve implementations from several vantage points. We perform internet-wide scans for TLS on a large number of ports, as well as SSH and IPsec to measure elliptic curve support and ...
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Bitcoin blockchain consensus
2018/1/27
The loosely defined terms hard fork and soft fork have established themselves as descriptors of different classes of upgrade mechanisms for the underlying consensus rules of (proof-of-work) blockchain...
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
public-key cryptography wild McEliece cryptosystem filtration
2016/1/25
We present a polynomial time structural attack against the McEliece system
based on Wild Goppa codes from a quadratic finite field extension. This attack uses the fact
that such codes can be disting...
Factoring RSA keys from certified smart cards: Coppersmith in the wild
factorization Coppersmith
2014/3/7
An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by govern...
Wild McEliece Incognito
public-key cryptography / McEliece cryptosystem Niederreiter cryptosystem Goppa codes wild Goppa codes list decoding
2012/3/26
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all att...
Survival in the Wild:Robust Group Key Agreement in Wide-Area Networks
Group Key Agreement Fault Tolerance Robustness
2009/6/5
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure
group communication. GKA is very useful in many types of peer group scenarios and applications...
In this paper we introduce a new primitive called identity-based encryption with wildcards, or
WIBE for short. It allows to encrypt messages to a whole range of users simultaneously whose
identities...