Breaking

Results: 5181



#Item
1Cryptocurrencies / Blockchains / Ethereum / Cross-platform software / Alternative currencies / Concurrent computing / Distributed computing / Smart contract / EIP / Computing / Ethereum Classic

Breaking down the EIP-999 debate Pros, Cons… and e v e r y t h i n g in b e t w e e n. Where it all starts: The Parity Hack

Add to Reading List

Source URL: edcon.io

Language: English - Date: 2018-10-16 07:02:08
2Cryptography / Cryptographic protocols / RC4 / Secure communication / Stream cipher / IEEE 802.11 / Transport Layer Security

All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS Mathy Vanhoef and Frank Piessens, KU Leuven USENIX Security 2015 RC4

Add to Reading List

Source URL: www.rc4nomore.com

Language: English - Date: 2018-09-24 16:02:05
3Cryptography / Quantum information science / Emerging technologies / Quantum computing / Quantum cryptography / Quantum algorithm / Block cipher / Quantum mechanics / Post-quantum cryptography / Quantum key distribution / Feistel cipher / Data Encryption Standard

Breaking Symmetric Cryptosystems using Quantum Period Finding Marc Kaplan1,2 , Ga¨etan Leurent3 Anthony Leverrier3 , and Mar´ıa Naya-Plasencia3 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
4World / Getlio Vargas / Vargas Era / Brazil / So Paulo / Government / Politics

BREAKING BARRIERS THE WORLD IS FULL OF OPPORTUNITIES. WE CREATE ACCESS TO THEM.

Add to Reading List

Source URL: www.amaaonline.com

Language: English - Date: 2014-08-05 14:13:58
5Computer architecture / Computing / Computer hardware / Computer memory / Memory management / Virtual memory / X86 architecture / Computer security / Meltdown / Translation lookaside buffer / CPU cache / Software Guard Extensions

Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution Revision 1.0 (August 14, 2018) Ofir Weisse3 , Jo Van Bulck1 , Marina Minkin2 , Daniel Genkin3 , Baris Kasikci3 , Frank Piessens

Add to Reading List

Source URL: foreshadowattack.eu

Language: English - Date: 2018-08-31 11:04:51
6Cryptography / Cryptographic protocols / Cryptographic hash functions / Secure communication / Transport Layer Security / Internet Standards / Cipher suite / Collision attack / MD5 / Man-in-the-middle attack / HMAC / OpenSSL

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
7Data / Marrakesh Treaty / Visual impairment / Law / Copyright / Information / Marrakesh VIP Treaty

WBU LETTER TO ALL GOVERNMENTS   In June 2013, governments put aside their differences and agreed an historic, ground-breaking treaty to help us end the "book famine" in which just a few percent of books are available i

Add to Reading List

Source URL: www.worldblindunion.org

Language: English - Date: 2016-11-07 12:05:09
8

From 40 years of RF design expertise comes the Masterpiece Ham Radio Transceiver Icom is a pioneer in the amateur radio world. Starting with the first analog PLL circuit in the IC-200 to the ground-breaking 32bit DSP te

Add to Reading List

Source URL: www.point.at

Language: English - Date: 2005-10-16 05:18:02
    9

    WHITE PAPER Go Nuclear: Breaking Radiation Monitoring Devices Ruben Santamarta Principal Security Consultant, IOActive

    Add to Reading List

    Source URL: ioactive.com

    Language: English - Date: 2018-08-17 20:57:50
      10

      OIP’S RESPONSE TO A STAGGERINGLY MISLEADING REPORT February 12, 2018 Last year, the Hawaii Office of Information Practices (OIP)1 responded to a report by the Civil Beat Law Center (CBLC) entitled, “Breaking Down Haw

      Add to Reading List

      Source URL: oip.hawaii.gov

      Language: English - Date: 2018-02-13 16:00:56
        UPDATE