Crypto-1

Results: 298



#Item
21

Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig

Add to Reading List

Source URL: www.math.auckland.ac.nz

- Date: 2014-01-05 18:06:58
    22

    Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2015-06-18 08:39:54
      23

      Informatik 1 fur ¨ D-BAUG, HS 2015 Velo Gangschaltung Problemstellung

      Add to Reading List

      Source URL: www.crypto.ethz.ch

      - Date: 2015-09-15 11:31:16
        24

        Facts about two-dimensional polynomialsGiven: f (x, y) = f00 + f10x + f01y + f11xy + ... + fttxty t ∈ F[x, y] Fact 1: fy0 (x) := f (x, y0) is a one-dimensional polynomial of degree t. Proof: f (x, y0) = (f00 +

        Add to Reading List

        Source URL: www.crypto.ethz.ch

        - Date: 2015-05-11 05:55:33
          25

          Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

          Add to Reading List

          Source URL: zoo.cs.yale.edu

          - Date: 2013-10-07 23:40:04
            26

            Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 1) Overview

            Add to Reading List

            Source URL: www.crypto.ethz.ch

            - Date: 2015-02-16 04:48:39
              27

              Informatik 1 fur ¨ D-BAUG, HS 2015 Rechnen mit endlichen Dezimalzahlen Repräsentation von Integern

              Add to Reading List

              Source URL: www.crypto.ethz.ch

              Language: German - Date: 2015-10-14 06:17:49
                28Cryptography / Encodings / X.690 / Computing / Information / Abstract Syntax Notation One / PKCS 1 / Padding / Hash function / Octet / Cryptographic hash function / RSA

                ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

                Add to Reading List

                Source URL: www.intelsecurity.com

                Language: English - Date: 2016-05-02 12:28:32
                29

                Informatik 1 fur ¨ D-BAUG, HS 2015 Generalabonnement 1

                Add to Reading List

                Source URL: www.crypto.ethz.ch

                Language: German - Date: 2015-09-25 12:19:34
                  30Graph theory / NP-complete problems / Hamiltonian path / Cycle / Hamiltonian / Zero-knowledge proof / Hamiltonian path problem

                  Cryptographic Protocols Spring 2015 Slides for Chapter 1 (6th lecture) Hamiltonian cycles

                  Add to Reading List

                  Source URL: www.crypto.ethz.ch

                  Language: English - Date: 2015-03-30 06:00:41
                  UPDATE