SaTC: CORE: Brute Force-Resistant Cryptographic Protocols Based on Biometric Data
Description preview
Security of most practical cryptographic protocols relies on secret keys and hence is subject to brute-force (exhaustive search) attacks. This means that an attacker can attempt to test all possible keys in order to find the right one. This is usually not a big concern, because the exhaustive search of strong cryptographic secret keys is…
Full details available on the Agency plan
Unlock the complete grant description, eligibility criteria, contract value, evaluation details and apply link — plus alerts, pipeline tracking, and CSV export.
Agency Plan
7-day free trialUnlock procurement & grants
Upgrade to access active tenders from World Bank, UNDP, ADB and more — with email alerts and pipeline tracking.
$29.99 / month
- 🔔Email alerts for new matching tenders
- 🗂️Track tenders in your pipeline
- 💰Filter by contract value
- 📥Export results to CSV
- 📌Save searches with one click