Embedding Data In Point on a Graph: The Beauty and Power Of Elliptic Curves
Tags
attack-pattern: | Data |
Common Information
Type | Value |
---|---|
UUID | 3f1307d1-1ac9-4333-8250-c950d1cc9403 |
Fingerprint | c9318f10a61778d |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | May 28, 2023, 6:48 a.m. |
Added to db | May 30, 2023, 8:23 p.m. |
Last updated | Nov. 8, 2024, 12:33 p.m. |
Headline | Embedding Data In Point on a Graph: The Beauty and Power Of Elliptic Curves |
Title | Embedding Data In Point on a Graph: The Beauty and Power Of Elliptic Curves |
Detected Hints/Tags/Attributes | 15/1/8 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | cipher.stream |
|
Details | Domain | 5 | go.dedis.ch |
|
Details | Domain | 6 | random.new |
|
Details | File | 14 | d.dat |
|
Details | sha256 | 1 | 0548656c6c6fafa4123b2c2b8eb4684fba762b954737738e386570c706979e93 |
|
Details | sha256 | 1 | 53456343d65c3fab484f793581b2d9f79cf1a7e991c27fe95836fef266c3d005 |
|
Details | sha256 | 1 | bad034fe125aaea5824205aef0ac60ec7e42ee11d419db2b912cbf01d7ff5f01 |
|
Details | sha256 | 1 | 060c7d8e1a93b4fd565df942f95a6e2d5a2a80441c929ee039aeb889f6c2baa8 |