Cryptography

Results: 21893



#Item
191

Overview of Certification Systems: X.509, PKIX, CA, PGP & SKIP Do you understand digital certificates? Do you know what they warrant? by Ed Gerck, Ph.D.* Cryptography and certification are necessary Internet features and

Add to Reading List

Source URL: nma.com

- Date: 2000-07-14 07:25:32
    192

    Toward Semantic Cryptography APIs Tudor Dumitraș Assistant Professor, ECE & MC2 University of Maryland, College Park Work with Soumya Indela, Mukul Kulkarni, and Kartik Nayak (UMD)

    Add to Reading List

    Source URL: cybersec-prod.s3.amazonaws.com

    - Date: 2016-12-05 15:24:36
      193

      Thinking about Cryptography: Crypto Flaws and How to Avoid Them Jonathan Katz Some good news and some bad news…

      Add to Reading List

      Source URL: cybersec-prod.s3.amazonaws.com

      - Date: 2016-12-05 15:17:30
        194

        Position-Based Quantum Cryptography: Impossibility and Constructions Full version available at http://arxiv.org/absHarry Buhrman∗ Vipul Goyal§

        Add to Reading List

        Source URL: qip2011.quantumlah.org

        - Date: 2011-01-03 00:32:15
          195

          Cryptography with Updates Prabhanjan Ananth UCLA Aloni Cohen

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-09-28 03:38:33
            196

            Journal of Psychoceramics http://dx.doi.org29292929x Correction: The Impact of Interactive Epistemologies on Cryptography

            Add to Reading List

            Source URL: psychoceramics.labs.crossref.org

            - Date: 2014-08-10 13:30:26
              197

              Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2010-09-15 14:13:14
                198

                The Power of Negations in Cryptography Siyao Guo∗ Tal Malkin† Igor C. Oliveira‡

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-04-07 06:33:25
                  199

                  Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

                  Add to Reading List

                  Source URL: liu.diva-portal.org

                  - Date: 2010-06-16 03:36:14
                    200

                    Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2010-05-11 17:26:42
                      UPDATE