Crypto

Results: 1625



#Item
751

2014 Crypto-WorldA. Československá šifra TTS a jej lúštenie (P. Javorka) B. Nový (souhrnný) pohled na otázky bezpečnosti eliptické

Add to Reading List

Source URL: www.crypto-world.info

Language: Czech - Date: 2014-09-14 18:58:07
    752Tunneling protocols / Internet privacy / Crypto-anarchism / Virtual private network / Cisco Systems VPN Client / Cyberwarfare / Computer security / Computer network security / Network architecture / Computing

    PDF Document

    Add to Reading List

    Source URL: carleton.ca

    Language: English - Date: 2013-07-02 08:14:11
    753

    Crypto-World – Abecední přehled všech autorů, kteří přispěli alespoň jednou svým článkem do e-zinu Crypto -World E.Antal, R.Barczi, P.Barreto, T.Beneš, M.Bond, D.Bosáková, D.Brechlerová, V

    Add to Reading List

    Source URL: www.crypto-world.info

    Language: Czech - Date: 2014-09-14 18:57:59
      754Cross-platform software / TrueCrypt / AES implementations / Cryptography / Software / Cryptographic software / Disk encryption

      Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

      Add to Reading List

      Source URL: truecrypt.ch

      Language: English - Date: 2015-04-03 03:20:15
      755Cryptographic protocols / Block cipher modes of operation / Crypto++ / Password-authenticated key agreement / Cryptography / Public-key cryptography / Cryptographic software

      Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2005-08-29 14:38:56
      756GMR / Claw-free permutation / Digital signature / One-way function / Goldwasser–Micali cryptosystem / Silvio Micali / Quadratic residue / RSA / Binary tree / Cryptography / Public-key cryptography / Electronic commerce

      Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2014-06-22 06:26:58
      757

      Kryptographie mit elliptischen Kurven Markus Hermann, Dejan Lazich Micronas GmbH Freiburg, 2006 Elliptische Kurven (EK) über 

      Add to Reading List

      Source URL: crypto.iti.kit.edu

      Language: German - Date: 2010-06-24 09:06:47
        758Computer network security / Internet privacy / Crypto-anarchism / Virtual private network / MPLS VPN / Customer-premises equipment / Single-pair high-speed digital subscriber line / Service-level agreement / Cloud computing / Network architecture / Computing / Computer architecture

        Standard Form of Agreement Service Description (MPLS VPN Cloud) Revised 15-Aug-2012 1

        Add to Reading List

        Source URL: www.zetta.net.au

        Language: English - Date: 2012-08-15 04:33:16
        759Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing

        OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

        Add to Reading List

        Source URL: www.syssec-project.eu

        Language: English - Date: 2014-09-11 05:58:33
        760Peer-to-peer computing / Numismatics / Cryptography / Coins of the United States / Proof-of-work system / Peer-to-peer / Penny / United States dollar / Australian one-cent coin / Currency / Software / Bitcoin

        PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake Sunny King, Scott Nadal (, ) August 19th, 2012 Abstract A peer-to-peer crypto-currency design derived from Satoshi Naka

        Add to Reading List

        Source URL: www.peercoin.net

        Language: English - Date: 2014-03-30 13:50:01
        UPDATE