Search results

Jump to navigation Jump to search
  • {{Short description|Surveillance or computer investigation}} ...uter_security)|computer exploits]] to analyze everything from the lowest [[computer memory|memory]] and [[central processing unit|CPU]] levels up to the highes ...
    16 KB (2,208 words) - 21:04, 3 August 2024
  • {{Short description|Security vulnerability in Diffie–Hellman key exchange}} ...20220224011050/https://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565|url-status=live}}</ref> ...
    12 KB (1,625 words) - 17:17, 5 July 2024
  • ...o many [[smart card]]s, [[Trusted Platform Module]]s (TPM), and [[Hardware Security Module]]s (HSM), including [[YubiKey]] 4 tokens when used to generate RSA k ...to being primes, the numbers should have certain other properties for best security. The vulnerable ''RSALib'' selection process quickly creates primes of the ...
    10 KB (1,364 words) - 03:49, 15 January 2025
  • ...| title=Advances in Cryptology – EUROCRYPT 2023 |series= Lecture Notes in Computer Science|volume= 14008|publisher=Springer |doi=10.1007/978-3-031-30589-4_15 ...ty to compromise modern cryptographic protocols (such as [[Transport Layer Security|TLS/SSL]]) has prompted the development of post-quantum cryptography.<ref>{ ...
    25 KB (3,825 words) - 01:30, 30 December 2023
  • The security of modern ECC depends on the intractability of determining ''n'' from {{mat ...e Channel Can Go a Long Way | publisher=Springer | series=Lecture Notes in Computer Science | volume=8731 | conference=Cryptographic Hardware and Embedded Syst ...
    32 KB (4,769 words) - 10:06, 13 February 2025
  • ...Attacks |title=Public Key Cryptography – PKC 2008 |series=Lecture Notes in Computer Science |date=2008 |last1=Lyubashevsky |first1=Vadim |volume=4939 |pages=16 ...eal Lattices and Learning with Errors over Rings | series=Lecture Notes in Computer Science | volume=6110 |citeseerx = 10.1.1.297.6108|doi=10.1007/978-3-642-13 ...
    39 KB (5,924 words) - 06:23, 17 June 2024
  • ...lized Prompt Rewriting |date=2024-06-16 |title=2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) |chapter-url=https://doi.org/10.1109/ ...to perform in-context learning can be viewed as a form of [[Meta-learning (computer science)|meta-learning]], or "learning to learn".<ref>{{Cite journal |date= ...
    43 KB (6,034 words) - 16:58, 13 February 2025