Crypto-1

Results: 298



#Item
61

DragonCon Crypto ChallengeSolutions 1. The _________ to Disney World will ____________ young kids Solution: entrance Entrance is a heteronym. A heteronym is a word that is written identically but has a different

Add to Reading List

Source URL: eff.dragoncon.org

Language: English - Date: 2015-09-13 17:43:15
    62

    Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Courtois1 , Karsten Nohl2 , and Sean O’Neil3 1 University College London, UK

    Add to Reading List

    Source URL: www.proxmark.org

    Language: English - Date: 2008-05-28 17:08:41
      63

      Comparing With RSA Julien Cathalo1? , David Naccache2 , and Jean-Jacques Quisquater1 1 ucl Crypto Group Place du Levant 3, Louvain-la-Neuve, b-1348, Belgium

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2011-12-14 05:30:40
        64

        CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm? Junaid Jameel Ahmad1 , Shujun Li2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

        Add to Reading List

        Source URL: fc12.ifca.ai

        Language: English - Date: 2012-02-18 14:34:11
          65

          Cryptanalysis of Crypto-1 Karsten Nohl University of Virginia The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tickets, and various other security-related a

          Add to Reading List

          Source URL: www.proxmark.org

          Language: English - Date: 2008-05-28 17:10:10
            66

            SCAs against Embedded Crypto Devices F.-X. Standaert UCL Crypto Group, Universit´ e catholique de Louvain Lecture 1 - Hardware Implementations

            Add to Reading List

            Source URL: attackschool.di.uminho.pt

            Language: English - Date: 2014-11-03 05:59:19
              67

              References [1] M. Abadi, E. Allender, A. Broder, J. Feigenbaum, and L. Hemachandra. On generating solved instances of computational problems. In S. Goldwasser, editor, Advances in Cryptology–CRYPTO ’88, volume 403 of

              Add to Reading List

              Source URL: www.credentica.com

              Language: English - Date: 2004-05-24 20:58:36
                68

                A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto

                Add to Reading List

                Source URL: www.uclouvain.be

                Language: English - Date: 2011-12-14 05:30:39
                  69

                  暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:IKE-SIG 2.関連する標準:RFC2409: “The Internet Key Exchange (IKE),” Internet

                  Add to Reading List

                  Source URL: crypto-protocol.nict.go.jp

                  Language: Japanese - Date: 2015-10-20 00:24:04
                    70

                    暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:EAP-Archie 2.関連する標準:Intenet Draft (The EAP Archie Protocol) (http://too

                    Add to Reading List

                    Source URL: crypto-protocol.nict.go.jp

                    Language: Japanese - Date: 2015-10-20 00:24:04
                      UPDATE