搜索结果: 1-2 共查到“军事学 configuration”相关记录2条 . 查询时间(0.015 秒)
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
key management smart cards
2017/2/20
Cryptographic APIs like PKCS#11 are interfaces to trusted hardware where keys are stored; the secret keys should never leave the trusted hardware in plaintext. In PKCS#11 it is possible to give keys c...
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
Guess-and-determine NFSR Sprout
2015/12/21
Guess-and-determine attacks are based on guessing a subset
of internal state bits and subsequently using these guesses together with
the cipher’s output function to determine the value of the remain...