Crypto-1

Results: 298



#Item
181Oblivious transfer / Cryptography / Paillier cryptosystem / Public-key cryptography

CS355: Topics in cryptography Spring 2010 Assignment #1 Due: Thursday, May. 6, 2010.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-08-22 15:53:32
182Quantum algorithms / Vehicle Identification Number / Finite fields / Coding theory

CS355: Topics in cryptography Assignment #1 Spring 2000

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-04-26 16:51:27
183Block cipher / Chosen-plaintext attack / One-time pad / Cipher / Ciphertext stealing / Vigenère cipher / Cryptography / Stream ciphers / Ciphertext

CS255: Cryptography and Computer Security Winter 2005 Assignment #1 Due: Wednesday, Jan. 26th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-18 19:58:02
184Network architecture / Computer architecture / Cyberwarfare / Crypto-anarchism / Virtual private networks / Virtual Private LAN Service / StrongSwan / Computer network security / Computing / Internet privacy

1. Parsec VPNsolutions_2012.indd

Add to Reading List

Source URL: www.parsec.co.za

Language: English - Date: 2014-05-31 05:37:37
185Online chat / Internet / Network architecture / Internet protocols / Internet Relay Chat / Internet standards / Transport Layer Security / MSN Chat / Computing / Java remote method invocation / Remote procedure call

CS255: Cryptography and Computer Security Winter 2000 Programming Project #1 Due: Monday, February 21st 2000, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-07 14:41:45
186Java remote method invocation / Remote procedure call / Password / Computer network security / Internet Relay Chat / Kerberos / Transport Layer Security / Computing / Internet / Email

CS255: Cryptography and Computer Security Winter 2004 Programming Project #1 Due: Monday, February 9th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-26 17:01:34
187Internet standards / Computer network security / Internet privacy / Crypto-anarchism / Virtual private network / RADIUS / Secure Shell / Dynamic DNS / Dynamic Host Configuration Protocol / Computing / Internet / Network architecture

LANCOM 1781-4G High-performance business VPN router with integrated modem for LTE 1 Ideal for high-speed Internet access at locations without a wired broadband connection 1 Integrated multimode LTE modem, backwards compa

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:23:11
188Password / Message authentication code / Key / Crypt / Computer network security / Transport Layer Security / Secure Shell / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2006 Programming Project #1 Due: Friday, February 10th, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-01 12:20:25
189Error detection and correction / MD5 / Hash function / SHA-1 / Collision resistance / Collision / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2009 Assignment #2 Due: Wednesday, Feb. 18, 2009.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-02-10 00:34:43
190XTR / Vehicle Identification Number / Information theory / Applied mathematics / Coding theory / Cryptography / Finite fields / Mathematics / Euclidean algorithm

CS255: Introduction to Cryptography Winter 2015 Assignment #3: Solutions Problem 1. (a) We have eeve deve = 1 (mod ϕ(N )). Thus, ϕ(N ) divides eeve deve − 1.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-15 20:33:19
UPDATE