Crypto-1

Results: 298



#Item
191Deterministic encryption / Mathematical sciences / Science / Ciphertext indistinguishability / Cryptography / Advantage / Ciphertext

CS255: Introduction to Cryptography Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-12 00:12:50
192Computing / SHA-2 / London / W postcode area / Bitcoin / Cryptographic nonce / Crypt / Hash function / Cryptography / Cryptographic hash functions / Software

GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BITCOIN MINING MACHINES Javed Barkatullah, Ph.D., MBA Timo Hanke, Ph.D.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-12 14:05:46
193Inference / Search engine indexing / Index term / Google Search / Web search engine / Information science / Information retrieval / Science

Web-Based Inference Detection Jessica Staddon1, Philippe Golle1, Bryce Zimny2 ∗ 1 Palo Alto Research Center

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-05-11 19:07:09
194Routers / Internet protocols / Routing protocols / Internet standards / Crypto-anarchism / Virtual private network / Border Gateway Protocol / PE router / Highway 1 / Network architecture / Computing / Computer architecture

Link Protect Link Protect – Fibre / ADSL Example The Link Protect service offers failover protection for your most important communication asset, your internet service. Link Protect provides your business

Add to Reading List

Source URL: www.zetta.net.au

Language: English - Date: 2012-09-04 11:19:46
195

CS255: Winter 2009 PRPs and PRFs 1. Abstract ciphers:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-01-25 22:18:32
    196Cryptographic software / Cryptographic hash functions / Key management / Password / Keychain / Salt / KeePass / Rainbow table / PBKDF2 / Cryptography / Software / Computer security

    Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-02-02 11:42:01
    197Computing / Computer architecture / Cyberwarfare / Crypto-anarchism / Virtual private network / Tunneling protocols / NeoAccel / Computer network security / Network architecture / Internet privacy

    Bylaws on the Virtual Private Network service associated with the ADC computer system March 1st, 2013 (Aim) Article 1

    Add to Reading List

    Source URL: www.adc.nao.ac.jp

    Language: English - Date: 2013-03-21 22:18:32
    198Cryptographic software / Science / Mathematical sciences / Knowledge / Cryptography / Cipher / International Cryptology Conference

    1 Cryptography in Practice • Crypto History • Crypto Technology

    Add to Reading List

    Source URL: web.interhack.com

    Language: English - Date: 2009-04-12 15:00:24
    199Security / Computer network security / Password / Bruce Schneier / Computer security / Computer virus / Email / Outlook Express / Password manager / Software / Antivirus software / Computing

    Page 1 of 2 The following article, written by Bruce Schneier, appeared in his CRYPTO-GRAM Newsletter dated May 15, 2001. The original article can be found at http://www.schneier.com/crypto-gram-0105.html#8

    Add to Reading List

    Source URL: www.nigelpentland.co.uk

    Language: English - Date: 2005-02-12 16:21:01
    200

    Vondruška, P.: Kryptologie, šifrování a tajná písma, nakladatelství Albatros, edice OKO, Praha, 2006 Ukázka z kapitoly 1. Abychom si rozuměli … Dešifrování Dešifrování je opačný proces k šifrování.

    Add to Reading List

    Source URL: crypto-world.info

    Language: Czech - Date: 2006-09-29 18:22:44
      UPDATE