They are often constructed from other primitives, such as block ciphers, unkeyed-hash functions or stream ciphers.

 
  • 当密码学依靠数学上的难解问题时,常常用在非对称密码学中,一些算法如因式分解就是潜在的攻击手段。
今日热词
目录 附录 查词历史