Cryptography Research

Results: 540



#Item
101

Cryptography Research Group X0 X1

Add to Reading List

Source URL: seas.virginia.edu

Language: English - Date: 2013-08-27 15:09:41
    102Cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Cipher suite / OpenSSL / HTTPS / Comparison of TLS implementations / Client certificate / WolfSSL

    Prying open Pandora’s box: KCI attacks against TLS Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes RISE – Research Industrial Systems Engineering GmbH {clemens.hlauschek, markus.gruber, flori

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    103Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

    ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

    Add to Reading List

    Source URL: esorics2015.sba-research.org

    Language: English - Date: 2015-09-22 04:03:47
    104Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:44
    105Probability / Cryptography / Statistics / Laplace distribution / Privacy / Ciphertext indistinguishability / Exponential mechanism

    Calibrating Noise to Sensitivity in Private Data Analysis Cynthia Dwork1 , Frank McSherry1 , Kobbi Nissim2 , and Adam Smith3? 1 Microsoft Research, Silicon Valley. {dwork,mcsherry}@microsoft.com

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2009-07-21 20:16:56
    106Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:36:15
    107Cryptography / Electric power / Secure multi-party computation / Public-key cryptography / Electricity meter / Smart meter / Smart grid / Cryptographic protocol / Privacy / Communications protocol / Zero-knowledge proof

    Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-11-04 03:36:30
    108

    Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2 1 Microsoft Research

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-12-02 05:21:30
      109Pseudorandom function family / Ciphertext indistinguishability / Cipher / Differential cryptanalysis / Stream cipher / Cryptography / Advantage / Block cipher

      BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security From Known-Plaintext Security to

      Add to Reading List

      Source URL: www.brics.dk

      Language: English - Date: 2001-11-06 09:17:54
      110Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / DNS root zone / DNS spoofing / Domain name system / Internet / Internet protocols

      Master Research Project Measuring the deployment of DNSSEC over the Internet Nicolas Canceill

      Add to Reading List

      Source URL: www.nlnetlabs.nl

      Language: English - Date: 2015-05-30 08:14:06
      UPDATE