Crypto

Results: 1625



#Item
31Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
32Cryptocurrencies / Colombian emeralds / Emerald / Computing / Blockchain / Information / Cut / Data

CRYPTO-TOKEN BACKED BY COLOMBIAN EMERALDS INTRODUCTION Investing in Colombian emeralds is becoming more popular, due to their unique characteristics, beauty and scarcity. There are more than USD 10 billion in Colombian

Add to Reading List

Source URL: src.gemera.io

Language: English - Date: 2018-07-03 19:35:45
33Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
34Indocrypt

Aug’13, SIAM AG’13, Ft. Collins, US.; Oct’13, CS UMinn; Dec’13, Kyushu U; Mar’14, NIST; Feb’15, Quantum-Resilient Crypto, Fukuoka; Aug’15: SIAM AG’15, Daejeon, KR. Professional Visits: • :

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2018-07-01 19:29:46
    35Money / Finance / Economy / Cryptocurrencies / Share trading / Financial markets / Alternative currencies / Robinhood / Order / Legality of bitcoin by country or territory / Bitcoin

    Microsoft Word - Robinhood Crypto Customer Code of Conduct.docx

    Add to Reading List

    Source URL: d2ue93q3u507c2.cloudfront.net

    Language: English - Date: 2018-08-16 02:39:17
    36Decentralization / Cryptocurrencies / Computing / Economy / Cryptography / Chitra / Blockchain / 9 / Fall / Bitcoin

    Episode 132: Chitra Ragavan On Making Crypto Accessible Kelley Weaver: Welcome to Crypto Token Talk, a crypto 101 podcast exploring how blockchain applications like bitcoin, Ethereum, and other crypto assets could chan

    Add to Reading List

    Source URL: cryptotokentalk.io

    Language: English - Date: 2018-07-05 13:30:01
    37Cryptocurrencies / Economy / Alternative currencies / Digital currencies / Cryptography / Money / Decentralization / Uberisation / Bitcoin

    Episode 132: Chitra Ragavan On Making Crypto Accessible We sit down with Chitra Ragavan, Chief Strategy Officer of Gem. She tells us about how she first got involved with cryptocurrency, including having to get clearance

    Add to Reading List

    Source URL: cryptotokentalk.io

    Language: English - Date: 2018-07-05 13:30:01
    38Cryptocurrencies / Money / Economy / Finance / Repurchase agreement / Counterparty / Bitcoin / Ethereum / Smart contract / Haircut / Decentralized exchange / Blockchain

    #1 DECENTRALIZED CRYPTOREPO PLATFORM BREATHING NEW LIFE INTO CRYPTO ASSETS

    Add to Reading List

    Source URL: oxygen.trade

    Language: English - Date: 2018-02-22 10:12:06
    39Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Block cipher / Data Encryption Standard / RC5 / Cryptanalysis / Keyword cipher / Churning / CPC Binary Barcode

    Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40
    40Cryptography / Mathematics / Post-quantum cryptography / Lattice-based cryptography / Lie groups / Computational hardness assumptions / Lattice problem / Lattice / Euclidean algorithm / LenstraLenstraLovsz lattice basis reduction algorithm / Ideal lattice cryptography / Short integer solution problem

    Gauss Sieve Algorithm on GPUs Shang-Yi Yang1 , Po-Chun Kuo1(B) , Bo-Yin Yang2 , and Chen-Mou Cheng1 1 Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan {ilway25,kbj,doug}@crypto.tw

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2018-05-28 18:07:35
    UPDATE