Cryptography Research

Results: 540



#Item
191Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
192Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
193Marriage certificate / Parish register / Public key certificate / Presbyterian Church of Aotearoa New Zealand / Marriage / Protestantism / Christianity / Genealogy / Behavior / Public-key cryptography

Archives Research Centre connecting past present & future Knox College Arden Street Dunedin, 9010 New Zealand

Add to Reading List

Source URL: www.archives.presbyterian.org.nz

Language: English - Date: 2014-01-22 21:56:38
194Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
195Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
196Internet protocols / Domain name system / Internet standards / Routing protocols / Public-key cryptography / Border Gateway Protocol / Domain Name System Security Extensions / IP hijacking / DNS spoofing / Network architecture / Internet / Computing

Internet Resilience in France 2013 Document produced by the ANSSI with the participation of the Afnic. Research and authoring by: François Contat, Mathieu Feuillet, Pierre Lorinquer, Samia M’timet,

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-03-11 14:09:01
197Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Electronic commerce / Proof-of-work system / Peer-to-peer / Public-key cryptography / Electronic money / Computing / Cryptography / Cryptographic hash functions

Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller1 , Ari Juels, Elaine Shi1 , Bryan Parno2 and Jonathan Katz1 1 University of Maryland 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-05-29 22:16:19
198Public key infrastructure / X.509 / Web of trust / Public key certificate / Certificate authority / Authorization certificate / PERMIS / Revocation list / PKI Resource Query Protocol / Cryptography / Public-key cryptography / Key management

1st Annual PKI Research Workshop---Proceedings Improvements on Conventional PKI Wisdom Carl Ellison

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2002-08-03 22:47:04
199Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
200Web of trust / X.509 / Public key fingerprint / Trusted third party / Key authentication / Simple public key infrastructure / Key server / Public key certificate / Certificate authority / Cryptography / Key management / Public-key cryptography

1st Annual PKI Research Workshop---Proceedings Public-key Support for Collaborative Groups Steve Dohrmann, Carl Ellison ,

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2002-08-03 22:47:04
UPDATE