Crypto-1

Results: 298



#Item
151ISO standards / Build automation / Ubiquitous computing / MIFARE / Near field communication / Configure script / Crypto-1 / Autoconf / Automake / Software / Wireless / Compiling tools

HACKING MIFARE CLASSIC Disclaimer: Please try this at home  Kishan Gupta This short paper is meant to get started to implement Dark-side Attack by Courtois and recover keys

Add to Reading List

Source URL: www.nicolascourtois.com

Language: English - Date: 2011-11-05 17:39:08
152Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
153Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
154Stream cipher / Block cipher / RSA / Ciphertext stealing / Key clustering / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2009 Assignment #1 Due: Wednesday, Jan. 28, 2009, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-02-20 20:45:19
155Block cipher / RSA / Chosen-plaintext attack / Ciphertext stealing / Triple DES / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2006 Assignment #1 Due: Wednesday, Feb. 1st, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-26 14:21:46
156Password / HMAC / Keychain / Cryptographic software / Digest access authentication / Password strength / Cryptography / Computer security / Security

CS255: Cryptography and Computer Security Winter 2008 Programming Project #1 Due: Friday, February 8th, 2008.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-02-01 18:07:18
157Cross-platform software / Java Development Kit / 1-Wire / Javac / Java / Computing / Java programming language / Java platform

CS255: Cryptography and Computer Security iButton extra credit Winter 2000

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-03-02 16:05:02
158Mathematical notation / Computational complexity theory / Asymptotic analysis / Combinatorics / Big O notation / Heap / Factorial / Randomized algorithm / Summation / Mathematics / Theoretical computer science / Analysis of algorithms

CS161 Design and Analysis of Algorithms Dan Boneh 1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-04-08 18:20:48
159

CS255: Winter 2007 PRPs and PRFs 1. Abstract ciphers:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-05 13:32:04
    1601-Wire / Software engineering / Digital signature / Cryptography / Java / Public-key cryptography / Computing / Computer programming

    CS255: Cryptography and Computer Security Winter 2000 iButton extra credit Due: Friday, March 10, 2000.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2000-03-06 12:56:24
    UPDATE