Cryptography Research

Results: 540



#Item
321Proof of knowledge / Public-key cryptography / Authentication / Zero-knowledge proof / Commitment scheme / IP / Cryptography / Cryptographic protocols / Access control

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation Man Ho Au,† Apu Kapadia,‡ Willy Susilo† † Centre for Computer and Information Security Research

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2012-10-11 17:03:20
322Austrian Institute of Technology / Secure multi-party computation / Maurer / Quantum information science / Cryptography / Seibersdorf / Cloud computing

AIT Austrian Institute of Technology, the Austrian research institute with European format which focuses on the key infrastructure issues of the future, is looking to strengthen its team in the Safety and Security Depart

Add to Reading List

Source URL: www.ait.ac.at

Language: English - Date: 2015-01-08 04:24:00
323Science / Identity management / Social issues / Knowledge / Game theory / Privacy / Internet privacy / Cryptography / Nash equilibrium / Formal sciences / Decision theory / Ethics

Introduction Basics of game theory Co-utility Co-utility example applications Cryptographic primitives for gradual privacy/utility Conclusions and research directions

Add to Reading List

Source URL: blogs.iec.cat

Language: English - Date: 2013-02-26 05:16:32
324PKCS / Abstract Syntax Notation One / Octet / Padding / RSA / Cryptographic hash function / Ip / Basic Encoding Rules / Cryptography / Cryptography standards / Public-key cryptography

Intel Security: Advanced Threat Research BERserk Vulnerability Part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5 September 29, 2014

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2014-09-30 12:40:24
325Peer-to-peer computing / Computing / Cryptographic hash functions / Hashing / Dwolla / Cryptography / Software / Bitcoin

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis

Add to Reading List

Source URL: federalreserve.gov

Language: English - Date: 2014-12-19 13:00:16
326Export Control Classification Number / International trade / Business / Export / Technology / Bureau of Industry and Security / Computer law / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

Bureau of Industry and Security, Commerce § [removed]Government-sponsored research covered by contract controls. (a) If research is funded by the U.S. Government, and specific national security controls are agreed on to p

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-29 11:17:16
327ADAPA / Modular arithmetic / Mathematics / Quadratic residue / Mathematical sciences / Electronic commerce / Public-key cryptography / RSA

The IR Toolbox: Research Methods in Action CAIR 2014 Program at a Glance Cells reflect the primary presenter and the featured research method / broad topical area only Refer to the reverse for complete titles and the off

Add to Reading List

Source URL: www.cair.org

Language: English - Date: 2014-11-16 14:41:43
328Knowledge / Health research / National Health and Nutrition Examination Survey / United States Department of Health and Human Services / Self-care / Comma-separated values / Codebook / Nutrition / Survey methodology / Cryptography / Science / Health

[removed]What We Eat In America – Food Commodity Intake Database (WWEIA-FCID[removed]The EPA’s WWEIA-FCID database is used to calculate estimates of food intake. It is an integral component in the DEEM/Calendex model

Add to Reading List

Source URL: fcid.foodrisk.org

Language: English - Date: 2014-09-10 13:32:34
329Probabilistic complexity theory / Cryptographic protocols / Computational complexity theory / Randomness / Complexity classes / Salil Vadhan / Zero-knowledge proof / Probabilistically checkable proof / Pseudorandomness / Theoretical computer science / Applied mathematics / Cryptography

Research Statement Salil Vadhan September[removed]

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English - Date: 2009-08-20 14:10:08
330Law / Research In Motion / S&P/TSX 60 Index / Term of patent / Patent / Economy of Canada / Elliptic curve cryptography / Reexamination / Civil law / Patent law / United States patent law / Intellectual property law

Serial No. _______________ Effective Date: ___________ Elliptic Curve Cryptography Patent License Agreement Between

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-15 13:07:34
UPDATE