|
|
|
[分享]新AES攻击得到证明
1) 2^110 以上~~真的是很大~~ 2) Side channel attact 並非萬靈丹,如果真的那麼有效的話,為何現在沒人在幾秒內用 side channel atack 去 break AES 或是其它的 cryptosystem 呢? |
|
[分享]Fuzzy + Security (business-to-consumer trust in electronic commerce)
1) 這個 code 本身就是為那篇 paper 設計的。 2) 慢慢來,我等這個 code 也等了~好幾年~你上次來這已經差不多要一個月~我倒是不急~ |
|
|
|
[原创]CRC算法及CRC密码之探讨
为了更好地探讨和研究密码,俺决定找个好网站~~~就找到了此坛~~~ 1) 您不用遺憾,好東西是須要時間粹練的。 2) 時間是證明你的東西是否是不是好東西的唯一檢驗標準。 3) 我之前建議您寫成 paper 型式,會比較好閱讀,也比較好傳閱,可惜您沒有這麼做。 4) 用 CRC 來做 encrypt/ decrypt 是沒問題的,但是要做成 cryptosystem 而言,需要更完整的檢驗。除非您能證明或是舉例,之前有人以 CRC 來實現 cryptosystem,那您提供引用或是來源處即可,若是原創,則是要完整的理論。 但在您這理,定沒有給定完整的分析。 如您有心將它發楊光大,請照我的建議重新編排它吧。 祝 安好 |
|
[求助]《An Advanced Timing Attack Scheme on RSA》谁能下载到全文呢?
I put the electronic file while I downloaded from IEEE's website. The file is 12126K bytes whitch it shows a 24 pages (slides), I compressed and put it here now. An Advanced Timing Attack Scheme on RSA.part01.rar An Advanced Timing Attack Scheme on RSA.part02.rar An Advanced Timing Attack Scheme on RSA.part03.rar An Advanced Timing Attack Scheme on RSA.part04.rar An Advanced Timing Attack Scheme on RSA.part05.rar An Advanced Timing Attack Scheme on RSA.part06.rar |
|
[求助]《An Advanced Timing Attack Scheme on RSA》谁能下载到全文呢?
為什麼不寫信直接向作者索取呢!? 若有出處~請一併給上~ for example: IEE/IEEE/ACM/SDOS or something else. 很可惜的事~他們放上去的只有 slides~ 沒有 original paper~ 還是得向 authors 索取~ An Advanced Timing Attack Scheme on RSA Toth, R.; Faigl, Z.; Szalay, M.; Imre, S. Page(s): 1-24 Digital Object Identifier 10.1109/NETWKS.2008.4763727 AbstractPlus | Full Text: PDF (12250 KB) Rights and Permissions |
|
[分享]A novel deniable authentication protocol
It has not any reply oever two weeks. I release a method in attachment. |
|
[原创]CRC算法及CRC密码之探讨
If you don't mind, can you write it down for paper here? I think, it is better way and easy to read and understand what you described. Best regards, |
|
|
|
[原创]基于Cache的计时攻击研究计划
[quote]" Instruction-level security analysis for information flow in stack-based assembly languages.pdf " [quote] I put [分享] Instruction-level security analysis for information flow there! |
|
[原创]基于Cache的计时攻击研究计划
现在流行一种攻击方式,称为旁路攻击 Does is called 'Side Channel Attack' ? Or... 1、详细了解Cached的工作原理,Intel 和 AMD CPU 资料。phate论坛中,此篇文章不错,可以好好学习学习! No body knows where it is. Please give a full URL. Is it [分享] Intel 和 AMD CPU 资料 'http://www.phate.tw/thread-6335-1-2.html'? 现在还不清楚如何构造一序列的影响正常执行指令的分支, Please read as follow paper, it may suit to you! Unfortunately, this file over 2 Mage Bytes, you can search on tihs board. If I remember, I put here for a long time. " Instruction-level security analysis for information flow in stack-based assembly languages.pdf " |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值