Back to Results
First PageMeta Content
Randomness / Malware / Ransomware / PGPCoder / Pseudorandomness / Random seed / Applied mathematics / Deniable encryption / Random number generation / Cryptography / Cryptovirology / Cyberwarfare


The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge
Add to Reading List

Document Date: 2008-06-12 15:35:33


Open Document

File Size: 3,04 MB

Share Result on Facebook

Company

Partner AG / Cap Gemini / Google / Microsoft / /

Country

France / /

Event

Product Issues / /

IndustryTerm

exponential law / Internet Aim / web server / Internet The Santy web worm / propagation algorithm / /

OperatingSystem

Microsoft Windows / /

Organization

Department of Economy / Department of Defense / /

Position

author / virus writer and the analyst / trick The author / designer / asymmetric cryptography The author / virus writer / author The writer / money The writer / analyst / /

Product

PRNG / PRNG E. Filiol / F. Raynal Malicious cryptography / /

Technology

encryption / cryptography / public key / propagation algorithm / dns / VPN / private key / secret key / /

URL

www.chikungunya.gouv.fr / http /

SocialTag