Search results
Jump to navigation
Jump to search
- {{Short description|Class of cryptographic attacks}} ...t ''e'' is small or when partial knowledge of a prime factor of the secret key is available. ...8 KB (1,377 words) - 06:54, 20 November 2024
- {{Short description|Cryptographic attack on the RSA system}} ...ntinued fraction|continued fraction representation]] to expose the private key ''d'' when ''d'' is small. ...12 KB (1,751 words) - 15:49, 21 February 2025
- ...of a [[Public-key cryptography|key pair]] to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acronym f ..._infineon_chips/ |title=Never mind the WPA2 drama... Details emerge of TPM key cockup that hits tonnes of devices |publisher=The Register |access-date=201 ...10 KB (1,364 words) - 03:49, 15 January 2025
- ...Ernst M. | last2= Gabidulin | title= Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 | chapter= The new construction of rank There are several proposals for public-key cryptosystems based on rank codes. However, most of them have been proven insecure (see e.g. Journ ...7 KB (1,141 words) - 20:03, 12 August 2023
- ...bility]], then with non-negligible probability, if the adversary is re-run on new inputs but with the same [[random tape]], its second output will also h ...dings of the 13th [[Association for Computing Machinery]] (ACM) Conference on Computer and Communications Security (CCS), [[Alexandria, Virginia]], 2006, ...9 KB (1,391 words) - 16:42, 17 November 2022
- ...]] in 1991.<ref>Rafail Ostrovsky, Moti Yung: How to Withstand Mobile Virus Attacks (Extended Abstract). PODC 1991: 51-59 [http://dl.acm.org/citation.cfm?doid= ..., the un-compromised (honest) ([[Shamir's Secret Sharing|Shamir-style]]) [[Key distribution|shares]] should be updated in a way that they generate the sam ...9 KB (1,406 words) - 10:35, 25 February 2025
- ...a generalization of cyclic lattices as ideal lattices. They can be used in cryptosystems to decrease by a square root the number of parameters necessary to describe ...n=978-3-642-13189-9 |editor-last=Gilbert|editor-first=Henri }}</ref> These cryptosystems are provably secure under the assumption that the [[shortest vector problem ...39 KB (5,924 words) - 06:23, 17 June 2024
- {{Short description|Security vulnerability in Diffie–Hellman key exchange}} ...status=live }}</ref> The discoverers were able to demonstrate their attack on 512-bit ([[export of cryptography from the United States|US export-grade]]) ...12 KB (1,625 words) - 17:17, 5 July 2024
- ...irst= Thomas|author2-last= Decru |chapter=An efficient key recovery attack on SIDH |chapter-url=https://eprint.iacr.org/2022/975.pdf | title=Advances in ...tography]] because the security of [[RSA (cryptosystem)|RSA]] is dependent on the infeasibility of factoring integers, the [[integer factorization proble ...25 KB (3,825 words) - 01:30, 30 December 2023