Crypto

Results: 1625



#Item
531

Cryptography and Computer Security CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-01-03 18:17:27
    532RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

    CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-02-11 11:47:35
    533Physics / Quantum teleportation / Qubit / BB84 / Density matrix / Quantum channel / Pauli matrices / Entropy / Quantum information / Quantum information science / Theoretical computer science / Quantum mechanics

    Private Quantum Channels and the Cost of Randomizing Quantum Information arXiv:quant-phv2 27 MarMichele Mosca∗

    Add to Reading List

    Source URL: crypto.cs.mcgill.ca

    Language: English - Date: 2005-08-29 16:38:18
    534XTR / Vehicle Identification Number / Information theory / Applied mathematics / Coding theory / Cryptography / Finite fields / Mathematics / Euclidean algorithm

    CS255: Introduction to Cryptography Winter 2015 Assignment #3: Solutions Problem 1. (a) We have eeve deve = 1 (mod ϕ(N )). Thus, ϕ(N ) divides eeve deve − 1.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-15 20:33:19
    535Internet Protocol / Virtual private networks / Crypto-anarchism / Internet privacy / IPv6 / OpenVPN / Cisco 837 / Computer network security / Computing / Network architecture

    Technical Specification VPN Router ERT50 • •

    Add to Reading List

    Source URL: www.lyconsys.com

    Language: English - Date: 2014-09-29 05:17:21
    536Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

    CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-01 19:29:53
    537Replay attack / Mallory / Alice and Bob / Adversary / Auguste Kerckhoffs / RSA / Cryptography / Cryptographic protocols / Public-key cryptography

    Microsoft PowerPointw11-Crypto_Notes.pptm

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2013-01-17 13:05:35
    538Cyberwarfare / DNS rebinding / DNS spoofing / Computer network security / Computing / Computer security

    Protecting Browsers from DNS Rebinding Attacks Collin Jackson Adam Barth Andrew Bortz

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2007-10-17 17:22:18
    539

    Authentication of Quantum Messages arXiv:quant-phv1 20 May 2002 Howard Barnum ∗, Claude Cr´epeau †, Daniel Gottesman ‡, Adam Smith §, and Alain Tapp ¶

    Add to Reading List

    Source URL: crypto.cs.mcgill.ca

    Language: English - Date: 2005-08-29 16:38:19
      540Internet privacy / Network architecture / Broadband / Electronic engineering / Crypto-anarchism / Virtual private network / Voice over IP / Home network / Modem / Computing / Computer network security / Electronics

      Business plan Metavector Siemens Atea Information and Communications

      Add to Reading List

      Source URL: www.osgi.org

      Language: English - Date: 2013-02-05 20:22:03
      UPDATE