Search results

Jump to navigation Jump to search
  • {{Short description|Surveillance or computer investigation}} ...uter_security)|computer exploits]] to analyze everything from the lowest [[computer memory|memory]] and [[central processing unit|CPU]] levels up to the highes ...
    16 KB (2,208 words) - 21:04, 3 August 2024
  • ...e attacks on computer systems that make use of [[cryptography]] in which [[computer memory]] or non-volatile storage is searched for private [[Key (cryptograph ...01-01|title=Playing Hide and Seek With Stored Keys|series=Lecture Notes in Computer Science|pages=118–124|citeseerx=10.1.1.40.4467}}</ref> on Key Finding attac ...
    7 KB (1,210 words) - 15:20, 7 January 2025
  • ...o many [[smart card]]s, [[Trusted Platform Module]]s (TPM), and [[Hardware Security Module]]s (HSM), including [[YubiKey]] 4 tokens when used to generate RSA k ...to being primes, the numbers should have certain other properties for best security. The vulnerable ''RSALib'' selection process quickly creates primes of the ...
    10 KB (1,364 words) - 03:49, 15 January 2025
  • ...d to be faster than existing digital signature schemes without sacrificing security. It was developed by a team including [[Daniel J. Bernstein]], Niels Duif, | title=High-speed high-security signatures ...
    18 KB (2,639 words) - 09:04, 1 February 2025
  • ...[decryption]] by national intelligence agencies, especially the [[National Security Agency]] (NSA).<ref>{{cite web|url=https://www.eff.org/document/crypto-wars ...lt with through case-by-case export license request proceedings brought by computer manufacturers, such as [[IBM]], and by their large corporate customers. ...
    37 KB (5,170 words) - 07:12, 18 February 2025
  • .../www.zdnet.com/article/new-alliance-promotes-the-blockchain-to-improve-iot-security-trust/|url-status=live}}</ref> and Mobility Open Blockchain Initiative (MOB ...ondon]] severed ties with the IOTA Foundation due to legal threats against security researchers involved in the report.<ref>{{Cite web|last=Mix|date=2018-04-28 ...
    48 KB (6,045 words) - 01:34, 19 February 2025
  • ...earch field that lies at the intersection of machine learning and computer security}} ...=Andi |last7=Swann |first7=Matt |last8=Xia |first8=Sharon |title=2020 IEEE Security and Privacy Workshops (SPW) |chapter=Adversarial Machine Learning-Industry ...
    67 KB (9,432 words) - 13:32, 21 February 2025
  • ...Quantum Gates |journal=arXiv |date=2001 }}</ref><ref name="Qutrit Quantum Computer with Trapped Ions" /> ...B |last2=Guzmán |first2=R |last3=Saavedra |first3=C |title=Qutrit quantum computer with trapped ions |journal=Physical Review A |date=2003 |volume=67:062313 | ...
    35 KB (4,992 words) - 13:53, 20 February 2025
  • ...18|isbn=978-1-4757-0604-8 }}</ref><ref>{{cite book|series=Lecture Notes in Computer Science|last1=Chaum|first1=David|last2=Fiat|first2=Amos|last3=Naor|first3=M ...2013| url-status=live}}</ref> The possibility that Satoshi Nakamoto was a computer collective in the European financial sector has also been discussed.<ref>{{ ...
    156 KB (19,847 words) - 00:02, 24 February 2025