Cryptographic engineering

Results: 331



#Item
81Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
82Cyberwarfare / ISO standards / Ubiquitous computing / Side channel attack / Smart card / Tamper resistance / Computer security / Cryptographic engineering / Power analysis / Security / Cryptography / Espionage

Side Channel Attacks and Countermeasures for Embedded Systems Job de Haas

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
83Electrical safety / Cryptographic protocols / Occupational safety and health / Electrical engineering / Safe / Security

Confirmation of Electrical Completion For use with BS 7909:2011, Code of Practice for Temporary Electrical Systems for Entertainment and related Purposes. This document confirms that the temporary electrical system and

Add to Reading List

Source URL: www.arrilightingrental.com

Language: English - Date: 2012-01-17 06:53:21
84Secret sharing / Proactive secret sharing / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Key management

Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 10:57:06
85Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
86Aruba Networks / Technology / Wireless LAN / FIPS 140 / Electronic engineering / Wireless access point / IEEE 802.11 / Cryptographic Module Validation Program / Cryptography standards / Wireless networking / Computing

Dell W-AP224 and W-AP225 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSJanuary 26, 2015 This is to advise that the Aruba Networks document entitled “FIPSNon-Propri

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:37
87Computer security / Computing / Internet privacy / Phishing / Social engineering / Spamming / Mutual authentication / Cross-site scripting / HTTP cookie / HTTP / Cryptographic protocols / Cybercrime

Secure Browsing Mode Version 1.2, 27 June 2006 Ivan Ristic () Introduction It is widely accepted today that web applications are inherently insecure. A lot of energy was

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:28
88Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
89Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
90Computing / Malware / Cryptographic nonce / Bluetooth / Computer network / Electronic engineering / Computer network security / Wireless security / Extensible Authentication Protocol / Technology / Mobile computers / Mobile device management

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
UPDATE