Tags
請先選擇一個 tag 才會顯示文章。
-
My First Article
2026-01-25
-
Find the Flag in a PDF
2026-01-26
-
Wiener's Attack on RSA
2026-01-26
-
Basic Encoding (Python)
2026-01-28
-
LLL reduction
2026-02-02
-
Lattice
2026-02-02
-
Web Cache Deception Payload Cheatsheet
2026-02-02
-
Web Cache Deception
2026-02-02
-
Lattice Reduction and Continued Fractions
2026-02-03
-
Lattice Based Attacks on RSA
2026-02-03
-
Lab: Exploiting an API endpoint using documentation
2026-02-04
-
Lab: Finding and exploiting an unused API endpoint
2026-02-04
-
Lab: Exploiting path delimiters for web cache deception
2026-02-04
-
Lab: Exploiting path mapping for web cache deception
2026-02-04
-
Partial Exposure of the LSBs of the RSA Decryption Exponent
2026-02-06
-
Partial Exposure of the MSBs of the RSA Decryption Exponent
2026-02-06
-
Partial Key Exposure Attacks
2026-02-06
-
Partial Exposure of some bits of the RSA Prime Factors
2026-02-06
-
Security of ElGamal
2026-02-11
-
Security of RSA
2026-02-11
-
Security of Encryption
2026-02-11
-
Modular Binomials
2026-03-01
-
GCD
2026-03-01
-
Freshman's Dream
2026-03-02
-
PRIMES is in P
2026-03-02
-
Sophomore’s Dream
2026-03-03
-
Safe and Sophie Germain Primes
2026-03-04
-
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures
2026-03-04
-
Tighter Security for Schnorr Identification and Signature: A High-Moment Forking Lemma for Sigma-Protocols
2026-03-04
-
Forking Lemma
2026-03-05
-
The One-More Discrete Logarithm Assumption in the Generic Group Model
2026-03-05
-
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
2026-03-05
-
Lower Bounds for Discrete Logarithms and Related Problems
2026-03-05
-
Biclique Attack
2026-03-08
-
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
2026-03-08
-
Tight Bounds on Uniform-Challenge Reductions from Sigma Protocols via Hitting Games
2026-03-08
-
Block Cipher
2026-03-09
-
Håstad’s Attack
2026-03-10
-
Boneh–DeMillo–Lipton Fault Attack
2026-03-11
-
Boneh-Durfee Attack
2026-03-11
-
Franklin–Reiter Attack
2026-03-11
-
Discrete Logarithm, RSA, and the Structure of $\mathbb{Z}_p^{\ast}$
2026-03-11
-
Security of Signatures
2026-03-20
-
Semantically Secure System
2026-03-21
-
Decision Problems
2026-03-22
-
List of NPC Problems
2026-03-22
-
Polynomial Complexity Classes
2026-03-22
-
P = NP?
2026-03-23
-
Bit Security
2026-03-24
-
Knapsack-Based Cryptosystems
2026-03-24
-
Prime Number Theorem
2026-03-24
-
Atlantic City Algorithm
2026-03-25
-
Las Vegas Algorithm
2026-03-25
-
Monte Carlo Algorithm
2026-03-25
-
Provable Security
2026-03-25
-
Random Self-Reduction
2026-03-25
-
Randomized Complexity Classes
2026-03-25
-
Snoop Dogg
2026-03-25
-
Tight Bounds on Uniform-Challenge Reductions from Sigma Protocols via Hitting Games - Introduction
2026-03-25
-
Security of DL-based Signature
2026-03-26
-
Security of RSA Signature
2026-03-26
-
好きだから。
2026-03-28
-
Fermat Primality Test
2026-03-29
-
Miller-Rabin Primality Test
2026-03-29
-
Primality Proving Algorithms
2026-03-29
-
Prime Numbers and Primality Testing
2026-03-29
-
Trial Division
2026-03-29
-
Difference of Two Squares and Relations
2026-03-30
-
Factoring Algorithms
2026-03-30
-
Number Field Sieve
2026-03-30
-
Pollard's p-1 Method
2026-03-30
-
Smooth Numbers and Factoring Complexity
2026-03-30
-
Adleman–Huang Algorithm
2026-03-31
-
Elliptic Curve Primality Proving (ECPP)
2026-03-31
-
DES
2026-03-31
-
Feistel Cipher
2026-03-31
-
Modes of Operation
2026-03-31
-
Rijndael
2026-03-31
-
Sophie-Germain Prime Density Conjecture
2026-04-02
-
Sophie-Germain Prime Conjecture
2026-04-02