Cryptographic engineering

Results: 331



#Item
101Espionage / FIPS 140-2 / Hardware security module / FIPS 140 / Tamper resistance / Technology / Cryptographic engineering / IBM / Cryptography standards / Cryptography / Computer security

V-OS Secure Mobile Middleware KEY BENEFITS What Delivering a solid security foundation for enterprise mobile applications.

Add to Reading List

Source URL: www.v-key.com

Language: English - Date: 2013-07-28 12:12:01
102Computer security / Social engineering / Cryptographic software / Password policy / Password strength / Security / Cryptography / Password

Monthly Quizzes January Quiz 1. T

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:51:37
103Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
104Primality tests / Mathematics / Modular arithmetic / Computing / Finite fields / Electronic engineering / Public-key cryptography / Paillier cryptosystem / Accumulator

On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho Dept. of Computer Science, University of Chile, Blanco Encalada 2120, 3er piso, Santiago, Chile.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 20:16:12
105OSI protocols / Computing / Electronic engineering / Cryptographic hash functions / SHA-2 / Transmission Control Protocol

A Hardware Interface for Hashing Algorithms December 17, 2008 Zhimin Chen, Sergey Morozov, Patrick Schaumont Bradley Department of Electrical and Computer Engineering Virginia Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 09:14:41
106Password / Security / Transaction authentication number / Data / Cryptographic protocols / Computer security / Challenge-response authentication

Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc∗,a , Kwangjo Kima a Auto-ID Lab Korea, Department of Information and Communications Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-09 03:45:40
107Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
108XDH assumption / Decisional Diffie–Hellman assumption / Electronic money / Public-key cryptography / Proof of knowledge / XTR / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of W

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-09 02:25:32
109Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
110Genetics / Biology / DNA / Secure multi-party computation / Genetic testing / Boolean circuit / Parental testing / DNA profiling / Actor model / Cryptographic protocols / Applied genetics / Cryptography

Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation Marina Blanton and Fattaneh Bayatbabolghani Department of Computer Science and Engineering University of Notre Dame mbl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 22:08:08
UPDATE