Crypto

Results: 1625



#Item
271Secure communication / Cryptography / Onion routing / Routing / Internet privacy / Crypto-anarchism / Tor / Mix network / Dining cryptographers problem / Anonymity / Len Sassaman

Design and Analysis of Efficient Anonymous-Communication Protocols

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-07 16:37:34
272Functional analysis / Computational complexity theory / Cryptography / Distribution / Proof of knowledge / IP / Zero-knowledge proof

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-07-07 05:51:55
273Bigfoot / Cryptozoology / Cryptozoologists / Canadian folklore / Cryptids / Cryptofiction / Loch Ness Monster / Loren Coleman / Jacko / Loch Ness / Sea serpent / Ren Dahinden

Crypto Volume II, Number IV October 1999 Crypto: Hidden or Secret, from the Greek kruptos meaning hidden

Add to Reading List

Source URL: www.strangeark.com

Language: English - Date: 2010-03-04 05:19:52
274Cryptography / Disk encryption theory / Block cipher / Feistel cipher / Malleability / Advantage / Ciphertext indistinguishability

The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:22
275Zurich metropolitan area / University of Zurich / ETH Zurich / Biogen / Zrich / Switzerland / Zurich / Draft:Lucerne Business / Draft:Crypto Valley

20141009_Karte_Schweiz_GZA_

Add to Reading List

Source URL: www.greaterzuricharea.com

Language: English - Date: 2016-01-22 08:51:41
276

¨ ETH Zurich, D-INFK HS 2015, 23. OktoberProf. Ueli Maurer

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: German - Date: 2015-10-23 03:57:56
    277Computer network security / Virtual private networks / Internet privacy / Network architecture / Crypto-anarchism / Control Panel / Taskbar / Point and click / SoftEther VPN / Social VPN

    ITSC Services User Guide – VPN – For Windows 7 Users VPN - For Windows 7 Users Step 1. Click Start, and then click Control Panel on the

    Add to Reading List

    Source URL: itsc.hsmc.edu.hk

    Language: English - Date: 2016-06-07 04:32:13
    278Oblivious transfer / CPC Binary Barcode / Broomfield School /  New Zealand

    Multi-Party Computation: Goal ⇒ Specification Protocol

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: English - Date: 2015-04-20 05:10:13
    279

    ETH Z¨ urich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: German - Date: 2015-11-09 12:15:27
      280Sammi Cheng discography / PTT Bulletin Board System / Draft:

      Protect Your Data; Safeguard Your Privacy™ Enigma Hardware Crypto Module 快速操作指南 雙重身份認證版本 1. 初始化 Enigma HCM (Enigma_CD for Windows)

      Add to Reading List

      Source URL: www.datafast.com.tw

      Language: English - Date: 2015-11-28 09:02:05
      UPDATE