書籍搜索
圖書
捐款
登錄
登錄
訪問更多功能
個人建議
電報機器人
下載歷史
發送到電子郵件或 Kindle
管理書單
保存到收藏夾
個人的
查詢書籍
探索
Z-推薦
書單
最受歡迎
類別
貢獻
捐款
上傳
Litera Library
捐贈紙質書籍
添加紙質書籍
Search paper books
我的 LITERA Point
術語搜索
Main
術語搜索
search
1
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysisdt@infootnoteThe authors thank Lev Pachmanov for programming and experiment support during the course of this research.dt@infootnote
acoustic
bits
figure
frequency
gnupg
leakage
rsa
key
khz
zero
algorithm
exponentiation
modular
multiplication
microphone
signal
brüel
kjær
routine
target
decryption
ciphertext
operand
setup
attacks
attacker
emanations
mul_basecase
analysis
capsule
noise
limb
operations
measurement
gnupg’s
keys
range
chosen
spectra
generated
random
spectrum
extraction
laptop
ciphertexts
security
current
recording
reduction
signature
文件:
PDF, 7.71 MB
你的標籤:
0
/
0
2
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version)
Daniel Genkin
multiplication
signal
key
exponent
rsa
elgamal
exponentiation
attacks
leakage
ciphertext
routine
attacker
algorithm
figure
gnupg
zero
multiplications
corresponding
frequency
trace
traces
decryption
sliding
bits
chosen
extraction
gnupg’s
modular
operand
signals
squaring
bandwidth
obtained
locations
pcs
operations
sdr
analysis
fixed
laptop
electromagnetic
gu0
receiver
peak
setup
mhz
target
url
ciphertexts
demodulation
文件:
PDF, 1.97 MB
你的標籤:
5.0
/
5.0
3
An Advanced Introduction to GnuPG
Neal H. Walfieldneal@gnupg.org
packet
ctb
key
hlen
gpg
gpg2
keyid
created
version
bits
gnupg
e149b3889e4da08c
subpkt
encrypted
hashed
pubkey
packets
signature
echo
enc
keys
secure
bytes
compressed
session
sigclass
ssh
s.gpg
expires
literal
security
indeterminate
630052d9
ae19dac58e678210
remote
smartcard
0x00
app
architecture
gnupg’s
random
insecure
md5len
openpgp
pinentry
server
entropy
parameters
testing
8e678210
文件:
PDF, 199 KB
你的標籤:
0
/
0
1
關注
此鏈接
或在 Telegram 上找到“@BotFather”機器人
2
發送 /newbot 命令
3
為您的聊天機器人指定一個名稱
4
為機器人選擇一個用戶名
5
從 BotFather 複製完整的最後一條消息並將其粘貼到此處
×
×