Cryptography Research

Results: 540



#Item
231Computer security / Cyberwarfare / Passphrase / Lorrie Cranor / Password policy / Password cracking / Cryptography / Security / Password

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay February 2015 CMU-ISR[removed]Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-02 16:44:46
232Ideal lattice cryptography / Cipher / Encryption / Public-key cryptography / Mathematical sciences / Science / Disk encryption / Cryptography / Homomorphic encryption / Mathematics

Securing the cloud with homomorphic encryption Research Directorate staff

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-06-10 12:49:49
233Computational complexity theory / Information theory / Quantum computer / Quantum cryptography / Quantum information / Postdoctoral research / Institute for Quantum Computing / Debabrata Goswami / Theoretical computer science / Applied mathematics / Quantum mechanics

Postdoctoral Fellowship in quantum computing SIGNAL AND INFORMATION PROCESSING APPLIED RESEARCH LABORATORIES The University of Texas at Austin The Signal and Information Sciences Laboratory (SISL) of the Applied Researc

Add to Reading List

Source URL: wwwext.arlut.utexas.edu

Language: English - Date: 2014-06-11 16:49:33
234Internet protocols / Challenge-response authentication / Authentication / Password authentication protocol / Password / Security / Cryptography / Computer security

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-09 13:40:40
235Revocation list / Key size / Key / Symmetric-key algorithm / X.509 / Cryptography / Key management / Public-key cryptography

Page < PAGE >2 of < NUMPAGES >27 OCPS Version 1.1 Draft March 31, 2002 Open Copy Protection System Philips Research Proposal to Broadcast Protection Discussion Group

Add to Reading List

Source URL: www.cptwg.org

Language: English - Date: 2004-04-30 19:02:04
236Cyberwarfare / Crypt / Cryptography / OTPW / Password strength / Security / Computer security / Password

Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-09-26 15:50:05
237Public-key cryptography / Finite fields / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Goppa code / Linear code / Reed–Solomon error correction / Forward error correction / Cryptography / Coding theory / Error detection and correction

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
238Eurocrypt / Academic publishing / Cryptology ePrint Archive / International Association for Cryptologic Research / Asiacrypt / Theory of Cryptography Conference / International Cryptology Conference

IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-09-22 14:38:03
239Computer crimes / Password / Passphrase / Keystroke logging / Crypt / Brute-force attack / Key derivation function / Transaction authentication number / Phishing / Cryptography / Security / Computer security

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
240Cryptography / Onion routing / Tor / .onion / Proxy server / Anonymizer / Anonymous remailer / Router / Mix network / Internet privacy / Internet / Computing

Onion Routing Access Con gurations Paul F. Syverson, Michael G. Reed, and David M. Goldschlag  Naval Research Laboratory

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:15:06
UPDATE