Cryptography Research

Results: 540



#Item
61Quantum information science / Quantum mechanics / Quantum information / Quantum cryptography / Quantum entanglement / Institute for Quantum Computing / John Watrous / Nicolas Gisin

Quantum Architechtures and Computation Group Microsoft Research Redmond, WAB Í fernandobrandao.org

Add to Reading List

Source URL: fernandobrandao.org

Language: English - Date: 2016-05-02 02:32:18
62Mathematical optimization / Applied mathematics / Cryptography / Operations research / Search algorithms / Cryptanalysis / Metaheuristic / Linear cryptanalysis / Advanced Encryption Standard / Genetic algorithm

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
63Digital typography / Cryptography / Visual cryptography / RSA / PostScript / Python / Command-line interface / Moni Naor / C / Adi Shamir

VCK: the Visual Cryptography Kit Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory The idea of visual cryptography is a fascinating invention by Moni Naor and Adi Shamir (199

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
64Privacy / Data security / Copyright law / Cryptography / Identity management / P3P / Digital rights management / Personally identifiable information / Internet privacy / Digital Copyright / Digital Millennium Copyright Act / Information security

Towards Realistic Assumptions, Models, and Goals for Security Research (White Paper for NSF Workshop) Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:19
65Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
66Cryptography / Secure multi-party computation / Secret sharing / Cryptographic protocol / Communications protocol

Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-09-07 12:36:30
67Disk encryption / Encryption / Block cipher mode of operation / Advanced Encryption Standard / Storage security / Cryptography / Data Encryption Standard / Hardware-based full disk encryption / Disk encryption hardware

NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:12
68Cryptography / Encryption / Cloud computing / Public-key cryptography / Cipher / Computer security / Cloud computing security / Perspecsys

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-09 09:17:21
69Block ciphers / Cryptography / Free software / Serpent / Data Encryption Standard / Python / Cipher / Crypt / Advanced Encryption Standard / Reference implementation / Python syntax and semantics

Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
70Operations research / Dynamic programming / Combinatorial optimization / Packing problems / Cryptography / Knapsack problem / Subset sum problem / Approximation algorithm / Algorithm / Greedy algorithm / Heuristic / Branch and bound

Hans Kellerer, Ulrich Pferschy, David Pisinger Knapsack Problems Springer’s internal project number, if known Mathematics – Monograph (English)

Add to Reading List

Source URL: bioinfo.ict.ac.cn

Language: English - Date: 2014-11-28 11:05:21
UPDATE