Skip main navigation
PLUSSA
v1.11.4
COMP.SEC.100 COMP.SEC.100 Kyberturvallisuus I / Cyber Security I
Begin by enrolling in a course.
Toggle navigation
Log in
Skip course navigation
Language
Change language
suomi
suomi
Course
COMP.SEC.100
Course materials
Your points
Lyhytvideot
Mitä tarkoittaa riski?
Inhimilliset tekijät
Käyttäjän manipulointi
Haittaohjelmat ja hyökkäystekniikat
Diffie-Hellman-Merklen avaintenvaihto
Verkon tietoturvatyökalut
Site
Home
Begin by enrolling in a course.
Log in
Unfortunately you are not permitted to see this content.
Skip course navigation
Language
Change language
suomi
suomi
Course
COMP.SEC.100
Course materials
Your points
Lyhytvideot
Mitä tarkoittaa riski?
Inhimilliset tekijät
Käyttäjän manipulointi
Haittaohjelmat ja hyökkäystekniikat
Diffie-Hellman-Merklen avaintenvaihto
Verkon tietoturvatyökalut
«
19.1 Alg
Course materials
19.3 Key Management
»
COMP.SEC.100
19. Applied Cryptography
19.2 Cryptographic Implementation
Cryptographic Implementation
¶
Cryptographic Libraries
¶
API Design for Cryptographic Libraries
¶
Implementation Challenges
¶
Length Side Channels
¶
Timing Side Channels
¶
Error Side Channels
¶
Attacks Arising from Shared Resources
¶
Implementation Weaknesses
¶
Attacks Arising from Composition
¶
Hardware Side Channels
¶
Fault Attacks
¶
Defences
¶
Random Bit Generation
¶
Posting submission...
«
19.1 Alg
Course materials
19.3 Key Management
»
Loading...
Loading...
×
None
×
No matches