文件名称:thesis-235.pdf
- 所属分类:
- 软件工程
- 资源属性:
- [PDF]
- 上传时间:
- 2014-02-06
- 文件大小:
- 4.11mb
- 下载次数:
- 0次
- 提 供 者:
- venka*****
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
Cryptographic algorithms are designed to protect data or communication in
the presence of an attacker. If these algorithms make use of a secret key, then
their security relies on the secrecy of the key. Hence, the primary objective
of an attacker typically is to extract the key. In a traditional black-box
environment, the attacker has only access to the inputs and outputs of a
cryptographic algorithm.
the presence of an attacker. If these algorithms make use of a secret key, then
their security relies on the secrecy of the key. Hence, the primary objective
of an attacker typically is to extract the key. In a traditional black-box
environment, the attacker has only access to the inputs and outputs of a
cryptographic algorithm.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
thesis-235.pdf