Cryptographic nonce

Results: 122



#Item
111Korean Broadcasting System / Cryptographic nonce / Cryptographic protocols / Information / Yahalom

Neumann Stubblebine 1

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2005-10-21 05:45:08
112Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data

Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Add to Reading List

Source URL: www.ijera.com

Language: English - Date: 2012-11-17 00:05:41
113Information / Time stamp protocol / XAdES / Cryptographic nonce / X.509 / Timestamp / Communications protocol / Data Validation and Certification Server / Trusted timestamping / Cryptographic protocols / Cryptography / Data

1 †

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-10 04:57:43
114Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
115Pseudorandom number generators / Cryptographic nonce / Crypto-1 / Linear feedback shift register / Keystream / Radio-frequency identification / Stream ciphers / Cryptography / MIFARE

PDF Document

Add to Reading List

Source URL: www.cs.ru.nl

Language: English - Date: 2008-10-03 05:39:16
116Grammar / Phonotactics / Nonce word / Natural language processing / Gradient well-formedness / Markedness / N-gram / Cryptographic nonce / Syllable / Linguistics / Phonology / Generative linguistics

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2008-01-31 10:49:43
117Cryptography / Cryptographic hash functions / Search algorithms / UMAC / Cryptographic nonce / HMAC / Hash function / Universal hashing / SHA-1 / Message authentication codes / Hashing / Error detection and correction

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2001-09-27 19:15:27
118Peer-to-peer computing / Computing / Payment systems / Financial cryptography / Electronic commerce / Electronic money / Public-key cryptography / Proof-of-work system / Cryptographic nonce / Cryptography / Software / Bitcoin

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-06 05:37:00
119Internet protocols / Secure communication / Elliptic Curve DSA / Elliptic curve cryptography / Cipher suite / Digital signature / Cryptographic nonce / RSA / Timing attack / Cryptography / Public-key cryptography / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-06-08 04:40:03
120Challenge-response authentication / Commitment scheme / IP / Zero-knowledge proof / Distance-bounding protocol / NP / Cryptographic nonce / Alice and Bob / Public-key cryptography / Cryptography / Cryptographic protocols / Complexity classes

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-07-23 09:02:44
UPDATE