搜索结果: 1-3 共查到“军事学 long-lived”相关记录3条 . 查询时间(0.096 秒)
Modeling Computational Security in Long-Lived Systems, Version 2
Modeling Computational Security Long-Lived Systems cryptographic services
2009/6/10
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited
computational power. This type of security degrades progressively over the lifetime of a pro...
Long-lived digital integrity using short-lived hash functions
Long-lived digital integrity short-lived hash functions
2008/8/20
New collision-finding attacks on widely used cryptographic hash functions raise questions about systems that depend on certain properties of these functions for their security. Even after new and pres...
Modeling Computational Security in Long-Lived Systems
Modeling Computational Security Long-Lived Systems
2008/5/23
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a prot...