Crypto

Results: 1625



#Item
421

Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Courtois1 , Karsten Nohl2 , and Sean O’Neil3 1 University College London, UK

Add to Reading List

Source URL: www.proxmark.org

Language: English - Date: 2008-05-28 17:08:41
    422

    Published in Journal of Cryptology 12(4):241–245, Chinese Remaindering Based Cryptosystems in the Presence of Faults Marc Joye UCL Crypto Group, D´ep. de Math´ematique, Universit´e de Louvain

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:41
      423

      OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

      Add to Reading List

      Source URL: openbsd.nuug.no

      Language: English - Date: 2013-12-16 07:37:43
        424

        Comparing With RSA Julien Cathalo1? , David Naccache2 , and Jean-Jacques Quisquater1 1 ucl Crypto Group Place du Levant 3, Louvain-la-Neuve, b-1348, Belgium

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:40
          425

          Building Intrusion Tolerant Applications Thomas Wu Michael Malkin

          Add to Reading List

          Source URL: crypto.stanford.edu

          Language: English - Date: 2010-06-04 16:24:11
            426Computing / Business / Cloud infrastructure / Cloud computing / IBM

            2010 ACM Cloud Computing Security Workshop (CCSW) 8 October 2010, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw10 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale

            Add to Reading List

            Source URL: digitalpiglet.org

            Language: English - Date: 2010-08-04 14:22:45
            427

            Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

            Add to Reading List

            Source URL: cisr.nps.edu

            Language: English - Date: 2012-10-30 13:53:03
              428

              CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm? Junaid Jameel Ahmad1 , Shujun Li2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

              Add to Reading List

              Source URL: fc12.ifca.ai

              Language: English - Date: 2012-02-18 14:34:11
                429Computing / Network architecture / Computer architecture / Virtual private networks / Computer network security / Internet privacy / Crypto-anarchism / Quality of service / Differentiated services / SoftEther VPN / Mobile virtual private network

                Microsoft Word - Dokument2

                Add to Reading List

                Source URL: www.kutter-fonds.ethz.ch

                Language: English - Date: 2010-05-16 10:11:22
                430

                2012 ACM Cloud Computing Security Workshop (CCSW) 19 October 2012, Sheraton Raleigh, Raleigh, NC, USA http://crypto.cs.stonybrook.edu/ccsw12 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.

                Add to Reading List

                Source URL: digitalpiglet.org

                Language: English - Date: 2012-04-13 18:02:24
                  UPDATE