Cryptographic nonce

Results: 122



#Item
11Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
12Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
13Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , ,  https://www.cryptolux.org/index.php/Argo

Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-07-22 02:06:59
14A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2016-04-15 12:48:33
151  Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-06-23 18:45:47
16I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
17Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research  Alan Jeffrey

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:44
18Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK  Alan Jeffrey

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
19Deterministic wallets  End Deterministic wallets Gregory Maxwell et. al.

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-05-26 22:22:44
20Overview  Bitcoin Problems with Bitcoin?

Overview Bitcoin Problems with Bitcoin?

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-10-22 02:47:23