文件名称:510
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
We show that an RSA private key with small public exponent can be eciently recovered
given a 0.27 fraction of its bits at random. An important application of this work is to the
\cold boot" attacks of Halderman et al. We make new observations about the structure of RSA
keys that allow our algorithm to make use of the redundant information in the typical storage
format of an RSA private key. Our algorithm itself is elementary and does not make use of the
lattice techniques used in other RSA key reconstruction problems. We give an analysis of the
running time behavior of our algorithm that matches the threshold phenomenon observed in
our experiments.
given a 0.27 fraction of its bits at random. An important application of this work is to the
\cold boot" attacks of Halderman et al. We make new observations about the structure of RSA
keys that allow our algorithm to make use of the redundant information in the typical storage
format of an RSA private key. Our algorithm itself is elementary and does not make use of the
lattice techniques used in other RSA key reconstruction problems. We give an analysis of the
running time behavior of our algorithm that matches the threshold phenomenon observed in
our experiments.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
510.pdf