Cryptography Research

Results: 540



#Item
301Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
302Key management / Public key certificate / Public-key cryptography / Pharmaceutical industry / Consent / Treaty / Law / Ethics / Clinical research / Electronic commerce

Nazareth College Human Subjects Research Committee Request for Amendment

Add to Reading List

Source URL: www.naz.edu

Language: English - Date: 2012-11-30 09:34:41
303Quantum information science / Information theory / Quantum computer / Quantum cryptography / Field-programmable gate array / Qubit / Quantum optics / Firmware / Quantum mechanics / Theoretical computer science / Physics / Applied mathematics

Department of Physics Quantum Device Lab Announcement for a Research Assistant Position “Real-time FPGA based signal processing and fast data acquisition for quantum computing architectures based on superconducting ele

Add to Reading List

Source URL: www.qudev.ethz.ch

Language: English - Date: 2014-07-01 05:58:56
304International trade / Business / Technology / International Traffic in Arms Regulations / United States Munitions List / Export / Office of Foreign Assets Control / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

Export Control Fact Sheet

Add to Reading List

Source URL: research.case.edu

Language: English - Date: 2012-11-07 15:35:02
305Identity management / Cryptographic software / Federated identity / Cryptography / Password / OTPW / Single sign-on / Two-factor authentication / One-time password / Security / Computer security / Access control

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes∗ Joseph Bonneau University of Cambridge Cambridge, UK [removed]

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-21 16:41:40
306Fieldnotes / Research / Code / Cryptography

RESCH-GE[removed]Fieldwork: Data Analysis Spring 2013, Wednesdays, 11:00 a.m. – 12:40 p.m. Professor Lisa M. Stulberg E-mail address: [removed] Phone number: ([removed]Office: 246 Greene Street, 3rd floo

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2013-01-29 20:16:12
307Semantic security / Adaptive chosen-ciphertext attack / Cramer–Shoup cryptosystem / Chosen-ciphertext attack / Advantage / Ciphertext / RSA / Cipher / Key-recovery attack / Cryptography / Signcryption / Ciphertext indistinguishability

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-20 21:27:06
308International trade / International relations / Business / International Traffic in Arms Regulations / United States law / Export / Office of Foreign Assets Control / National Security Agency / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

Should you be concerned about EXPORT CONTROLS

Add to Reading List

Source URL: research.ncsu.edu

Language: English - Date: 2012-03-15 10:53:58
309Elliptic curves / Abelian varieties / Finite fields / Diophantine geometry / Analytic number theory / Mordell–Weil theorem / Elliptic function / Victor S. Miller / Birch and Swinnerton-Dyer conjecture / Abstract algebra / Mathematics / Algebraic geometry

Elliptic Curve Cryptography: Invention and Impact: The invasion of the Number Theorists Victor S. Miller IDA Center for Communications Research Princeton, NJ[removed]USA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-06-12 08:54:49
310NP-complete problems / Combinatorial optimization / Cryptography / Knapsack problem / Operations research / Theoretical computer science / Applied mathematics / Dynamic programming

Improved Generic Algorithms for Hard Knapsacks? Anja Becker1,?? , Jean-S´ebastien Coron3 , and Antoine Joux1,2 1 University of Versailles Saint-Quentin-en-Yvelines 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-31 08:22:53
UPDATE