Digital signitures - Integrity, Authentication, Non-Repudiation, Key stretching - mechanism for extending the length of a cryptographic, PBKDF2, Bcrypt - examples of key stretching, Elliptic Curve Cryptography (ECC) - Asymmetric, Low processing, suitable for mobile devices, PFS - refers to a solution designed to strengthen the security of session keys, Quantum Computing - emerging field of advanced computing technologies based on the principles of physics, Post-quantum cryptography - According to predictions, the most future-proof cryptographic, ephermal key - asymmetric encryption key designed to be used only for a single session or transaction, session key - Used during a single session, Symmetric key, Symmetric - Twofish, Serpent, AES (Rijndael), Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer, and IDEA, asymectric - RSA, DSA, Diffie-Hellman, ECC, ECDH, ECDSA, ElGamal, Lattice-based crypt, Post-Quantum, obscurity concept - code obsfucation, steganography, SSID broadcast suppression,

排行榜

視覺風格

選項

切換範本

恢復自動保存: ?