文件名称:thesis-235.pdf
-
所属分类:
- 标签属性:
- 上传时间:2014-02-06
-
文件大小:4.11mb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
Cryptographic algorithms are designed to protect data or communication in
the presence of an attacker. If these algorithms make use of a secret key, then
their security relies on the secrecy of the key. Hence, the primary objective
of an attacker typically is to extract the key. In a traditional black-box
environment, the attacker has only access to the inputs and outputs of a
cryptographic algorithm.
the presence of an attacker. If these algorithms make use of a secret key, then
their security relies on the secrecy of the key. Hence, the primary objective
of an attacker typically is to extract the key. In a traditional black-box
environment, the attacker has only access to the inputs and outputs of a
cryptographic algorithm.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
thesis-235.pdf
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.