Cryptographic nonce

Results: 122



#Item
101Peer-to-peer computing / Computing / Proof-of-work system / Coins / Cryptographic nonce / Consensus / Mining / Electronic money / Proof coinage / Cryptography / Software / Bitcoin

Reasons for why centralization has occurred and potential solutions By Tim Swanson Many adopters mistakenly think that mining is cheap, free or miraculously perpetual. It is none of the above, over the next year alone at

Add to Reading List

Source URL: www.ofnumbers.com

Language: English - Date: 2014-07-15 14:38:26
102Elliptic curve cryptography / Key size / OpenSSL / CPU cache / Advanced Encryption Standard / Cryptographic nonce / Side channel attack / Timing attack / Lookup table / Cryptography / Key management / Elliptic Curve DSA

Recovering OpenSSL ECDSA Nonces Using the F LUSH +R ELOAD Cache Side-channel Attack Yuval Yarom The University of Adelaide Naomi Benger

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-24 05:24:23
103Network architecture / Internet Key Exchange / IPsec / StrongSwan / Cryptographic nonce / Trusted computing base / Cryptographic protocols / Data / Information

IKEv2 Separation: Extraction of security critical components into a Trusted Computing Base (TCB) Reto Bürki, Adrian-Ken Rüegsegger

Add to Reading List

Source URL: www.codelabs.ch

Language: English - Date: 2013-02-04 11:05:01
104Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: bitcoin.org

Language: English - Date: 2014-07-01 15:32:51
105Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: franksz.files.wordpress.com

Language: English - Date: 2013-02-12 17:26:35
106Electronic commerce / Key management / Trusted timestamping / Digest access authentication / Transport Layer Security / MD5 / X.509 / Cryptographic nonce / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

CMSC 681 Project Report Implementation of TSP Protocol ---CMSC 681 Project Report Youyong Zou

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2000-12-14 22:35:14
107Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
108Cryptographic protocols / Computing / Information / Near field communication / Internet protocols / Mobile payment / Needham–Schroeder protocol / Coupon / Cryptographic nonce / Technology / Mobile telecommunications / Wireless

Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR Ali Alshehri, Johann A. Briffa, Steve Schneider and Stephan Wesemeyer Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: A.A.Als

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2012-12-22 16:41:06
109Information / Needham–Schroeder protocol / Cryptographic nonce / Promela / Public-key cryptography / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / HTTPsec / Cryptographic protocols / Data / Cryptography

Using SPIN to Verify Security Properties of Cryptographic Protocols Paolo Maggi and Riccardo Sisto Dip. di Automatica e Informatica - Politecnico di Torino Corso Duca degli Abruzzi 24, I[removed]Torino, ITALY maggi@athena.

Add to Reading List

Source URL: spinroot.com

Language: English - Date: 2008-06-30 15:34:28
110Cryptographic protocols / Internet protocols / X.509 / Public key certificate / MD5 / Certificate authority / Cryptographic nonce / Certificate server / TSIG / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - secalgor.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:45:21
UPDATE