计算机
课程内容
计算机安全与取证之哈希函数和公钥加密
Security properties of hash functions
Constructions for hash functions
SHA-1, SHA-2
Application of hashing: Password hashing.
Public Key Encryption
IND-CCA Security of Public Key Encryption
Key Encapsulation Mechanisms
Hybrid Encryption
rTwTroy发布于 April 05,2024