Cryptography Research

Results: 540



#Item
261Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: gauss.ececs.uc.edu

Language: English - Date: 2010-06-01 13:28:51
262Interference / Randomness / Cryptography / Patterns / Speckle pattern / Entropy / Security token / Key size / Scattering / Physics / Geometry / Coding theory

RESEARCH ARTICLES 25. M. R. Singleton, D. B. Wigley, J. Bacteriol. 184, [removed]J. M. Caruthers, D. B. McKay, Curr. Opin. Struct. Biol. 12, [removed]J. P. Abrahams, A. G. Leslie, R. Lutter, J. E. Walker,

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:01
263Legal documents / Law / Algernon Charles Swinburne / Legal instrument / Signature / Digital signature / Act / Cryptography / Civil law / Notary

Swinburne University of Technology 1 Document Execution Form Staff and document signatories must ensure that this form is completed before a legal document such as an Agreement or MOU is signed by Swinburne University of

Add to Reading List

Source URL: www.research.swinburne.edu.au

Language: English - Date: 2014-01-05 20:01:23
264Block ciphers / Block cipher / Data Encryption Standard / Block size / Initialization vector / Cipher / Symmetric-key algorithm / Key schedule / ARIA / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

International Journal of Engineering Research Volume No.3, Issue No.12, pp : [removed]ISSN:[removed]online),[removed]print) 01 Dec. 2014

Add to Reading List

Source URL: www.ijer.in

Language: English - Date: 2014-11-30 09:12:30
265Money / Payment systems / Computing / Financial cryptography / Dwolla / Bitcoin / Peer-to-peer computing / Electronic commerce

USCC Economic Issue Brief No. 4 | May 12, 2014 Bitcoin’s Uncertain Future in China Lauren Gloudeman, Research Fellow

Add to Reading List

Source URL: www.uscc.gov

Language: English - Date: 2014-11-02 11:22:51
266Cryptography standards / Implicit certificate / MQV / SECG / Research In Motion / Elliptic Curve DSA / Key-agreement protocol / Digital signature / ECC patents / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - Certicom secg_patent.dot

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:08
267Key management / Elliptic curve cryptography / IEEE P1363 / MQV / Integrated Encryption Scheme / Elliptic curve / Key size / SECG / Digital signature / Cryptography / Public-key cryptography / Cryptography standards

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:11
268Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
269Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
270Key management / Implicit certificate / Electronic commerce / Hash function / SHA-1 / Collision resistance / Digital signature / Public key certificate / Elliptic curve cryptography / Cryptography / Cryptographic hash functions / Public-key cryptography

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Matthew Campagna ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:13
UPDATE