Cryptography Research

Results: 540



#Item
521Ronald Cramer / Moni Naor / Centrum Wiskunde & Informatica / Jacques Stern / Hideki Imai / International Cryptology Conference / David Naccache / Silvio Micali / Arjen Lenstra / Cryptography / PKC / International Association for Cryptologic Research

Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors:

Add to Reading List

Source URL: f3.tiera.ru

Language: English - Date: 2010-01-05 10:02:28
522Fault-tolerant computer systems / Technology / Packaging / Tamper resistance / Software quality / Application checkpointing / Copy protection / Error detection and correction / Encryption / Cryptography / Computing / Security

Tamper-Tolerant Software: Modeling and Implementation Mariusz H. Jakubowski† , Chit Wei (Nick) Saw† and Ramarathnam

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-07-03 12:00:41
523Quantum cryptography / Computational complexity theory / Quantum information science / Quantum key distribution / XTR / Leftover hash lemma / Quantum computer / Expected value / Entanglement distillation / Cryptography / Theoretical computer science / Applied mathematics

Unconditional Security in Quantum Cryptography DOMINIC MAYERS NEC Research Institute, Princeton, New Jersey

Add to Reading List

Source URL: xxx.tau.ac.il

Language: English - Date: 2004-09-28 21:44:14
524Science / Password / Commonwealth Scientific and Industrial Research Organisation / Cryptography

Using Gaze Based Passwords as an Authentication Mechanism for Password Input

Add to Reading List

Source URL: 2013.petmei.org

Language: English - Date: 2013-09-02 02:53:13
525Verifiable computing / Security / Computing / Verifiable secret sharing / Cryptography / Distributed computing / Secure communication

Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro1 , Craig Gentry1 , and Bryan Parno2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-09-13 21:49:30
526Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data

Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Add to Reading List

Source URL: www.ijera.com

Language: English - Date: 2012-11-17 00:05:41
527Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
528Computational complexity theory / Operations research / Quantum computer / Quantum cryptography / Tabu search / Algorithm / Quantum algorithm / Adiabatic quantum computation / Simulated annealing / Applied mathematics / Theoretical computer science / Mathematics

Experimental Evaluation of an Adiabatic Quantum System for Combinatorial Optimization Catherine C. McGeoch

Add to Reading List

Source URL: www.cs.amherst.edu

Language: English - Date: 2013-05-10 07:06:47
529Applied mathematics / Security / Paillier cryptosystem / Cryptosystem / ElGamal encryption / Ciphertext / RSA / BRIC / Homomorphic encryption / Public-key cryptography / Cryptography / Cyberwarfare

BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2004-03-29 07:38:52
530Elliptic functions / Modular forms / Cryptography / Public-key cryptography / Lattice points / Homomorphic encryption / Vector space / XTR / RSA / Algebra / Mathematics / Abstract algebra

WEWoRC 2011 West European Workshop on Research in Cryptography

Add to Reading List

Source URL: www.uni-weimar.de

Language: English - Date: 2011-07-20 09:48:17
UPDATE