Cryptographic engineering

Results: 331



#Item
301Wi-Fi / Electronic engineering / Wireless networking / IEEE 802.1X / Wireless access point / IEEE 802.11 / Electronics / Wi-Fi Protected Access / Wireless security / Computer network security / Computing / Cryptographic protocols

VT2210_Datasheet_June2011_jb.ai

Add to Reading List

Source URL: www.vivato.com

Language: English - Date: 2011-08-19 22:40:04
302Natural language processing / Artificial intelligence / Error detection and correction / Hash function / Cryptography / Hashing / Information retrieval / Hash table / Cryptographic hash function / Search algorithms / Information science / Science

Near Duplicate Detection in an Academic Digital Library ‡ Kyle Williams‡ , C. Lee Giles†‡ Information Sciences and Technology, † Computer Science and Engineering

Add to Reading List

Source URL: clgiles.ist.psu.edu

Language: English - Date: 2014-01-08 12:02:03
303Digital circuits / Cryptographic protocols / Mathematics / Computational complexity theory / Secure multi-party computation / Boolean circuit / Multiplexer / Circuit / Boolean algebra / Theoretical computer science / Computing / Algebraic logic

Fairplay — A Secure Two-Party Computation System Dahlia Malkhi1 , Noam Nisan1 , Benny Pinkas2 , and Yaron Sella1 1 The School of Computer Science and Engineering The Hebrew University of Jerusalem

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-07-02 10:26:47
304Side channel attack / Smart card / Cypherpunks / Cryptography / Workshop on Cryptographic Hardware and Embedded Systems / Cryptographic engineering

Workshop on Cryptographic Hardware and Embedded Systems (CHES[removed]sponsored by IACR www.chesworkshop.org

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2009-11-20 03:17:03
305NIST hash function competition / Integrated circuits / Electronic design automation / Cryptographic hash functions / Electronic design / Application-specific integrated circuit / Keccak / Field-programmable gate array / Standard cell / Electronic engineering / Electronics / Cryptography

SHA-3 Conference, March 2012, Lessons Learned from Designing a 65 nm ASIC for Evaluating Third Round SHA-3 Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:01:30
306Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
307Economics / Social engineering / Phishing / Usability / Password / Threat / Internet fraud / Psychology / Cognitive psychology / Behavior / Behavioural sciences / Science

CHAPTER 2 Usability and Psychology Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:38:22
308Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
309Cryptographic hash functions / Digital electronics / Field-programmable gate array / Xilinx / Keccak / SHA-2 / Altera / Joint Test Action Group / NIST hash function competition / Electronic engineering / Electronics / Fabless semiconductor companies

SHA-3 Conference, March 2012, Lightweight Implementations of SHA-3 Fialists on FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:06:14
310Computer network security / Secure communication / Crime prevention / National security / Computer security / Indian Institute of Technology Bombay / Cyberwarfare / Cryptographic engineering / Security / Cryptographic protocols / Cryptography

Some Puzzles Security Connection Cryptography Need For Formal Methods Cryptographic Protocols and Network Security

Add to Reading List

Source URL: www.cse.iitb.ac.in

Language: English - Date: 2004-10-14 10:22:53
UPDATE