Cargando…
A Comprehensive Study of the Key Enumeration Problem
In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memo...
Autor principal: | Villanueva-Polanco, Ricardo |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514303/ http://dx.doi.org/10.3390/e21100972 |
Ejemplares similares
-
The maximum clique enumeration problem: algorithms, applications, and implementations
por: Eblen, John D, et al.
Publicado: (2012) -
Collective Enumeration
por: Bahrami, Bahador, et al.
Publicado: (2012) -
Graphical enumeration
por: Harary, Frank, et al.
Publicado: (1973) -
An Introduction to Enumeration
por: Camina, Alan, et al.
Publicado: (2011) -
Combinatorial Enumeration
por: Goulden, Ian P, et al.
Publicado: (2004)