Cryptology

Results: 302



#Item
131Eurocrypt / Asiacrypt / International Cryptology Conference / Py / Year of birth missing / Tom Berson / Auditing / Corporate governance / PKC / Cryptography / Committees / Workshop on Cryptographic Hardware and Embedded Systems

MINUTES IACR BOARD MEETING CRYPTO’12 UCSB, 19 AUGUSTO PENING M ATTERS AtPreneel opens the meeting and he briefly goes around to confirm attendees and establish who is holding proxies. The agenda is appr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:22:10
132Tom Berson / Workshop on Cryptographic Hardware and Embedded Systems / International Cryptology Conference / Asiacrypt / PKC / Theory of Cryptography Conference / Journal of Cryptology / Bart Preneel / Cryptography / International Association for Cryptologic Research / Eurocrypt

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:55:40
133Computer virus / International Cryptology Conference / Antivirus software / Computer worm / Cyberwarfare / Computer security / Science / Cryptography / Malware / Cryptovirology

Cryptovirology A matter of precision A matter of time A matter of stealth Last words

Add to Reading List

Source URL: www.quarkslab.com

Language: English - Date: 2013-07-15 08:52:43
134Bimal Kumar Roy / Science / Indian Statistical Institute / Cryptography / Education in Kolkata / India / Asiacrypt / Association of Commonwealth Universities / Year of birth missing / Cryptology Research Society of India / Indocrypt

Curriculum Vitæ Bimal Kumar Roy Director, Indian Statistical Institute www.isical.ac.in/~bimal

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2015-02-25 23:53:37
135Cryptography / Science / Knowledge / Mathematical sciences / Cryptanalysis / Cryptology

Formally Certifying the Security of Digital Signature Schemes

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
136Cryptography / Science / Knowledge / Mathematical sciences / Cryptanalysis / Cryptology

Formally Certifying the Security of Digital Signature Schemes

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
137Cryptology / Cryptography / ProVerif / Knowledge / Science / Mathematical sciences / Cryptanalysis

Formal Certification of Game-Based Cryptographic Proofs Santiago Zanella B´eguelin IMDEA Software, Madrid, Spain INRIA Sophia Antipolis - M´

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
138FEAL / Lecture Notes in Computer Science / International Cryptology Conference / Computational hardness assumptions / Cryptographic protocols / Diffie–Hellman problem / Index of cryptography articles / Cryptography / LOKI / Data Encryption Standard

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
139System software / Android / Search algorithms / Dalvik / Java virtual machine / Hexadecimal / Algorithm / Hash function / Java / Computing / Error detection and correction / Software

Android: From Reversing to Decompilation Anthony Desnos, Geoffroy Gueguen ESIEA: Operational Cryptology and Virology Laboratory , Abstract This talk deals with Android’s bytecode analysi

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:34
140PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
UPDATE