军事学 >>> 军事学
搜索结果: 1-8 共查到军事学 Cold相关记录8条 . 查询时间(0.046 秒)
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the pr...
In this paper we study the question of key management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key manage...
In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a computer is rebooted the memory contents are rarely fully reset; instead, a...
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers, suc...
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers, suc...
The end of the Cold War has precipitated dramatic cuts to defence budgets in the United States, leaving politicians and military officials scrambling to reassess the balancing of scarce resources and ...
Having done a seminar presentation on Hoffmann's Gulliver's Troubles (1968), consulted on various occasions Hoffmann's The State of War (1965) and Living With Nuclear Weapons (1983) coauthored by Hoff...
The LSE Cold War Studies Centre (CWSC) is the main British centre for advanced study and research on the Cold War, its historical origins and contemporary repercussions. The Centre concentrates its re...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...