Index of cryptography articles

Results: 178



#Item
21RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
22Internet privacy / Secure communication / Public-key cryptography / Secure Real-time Transport Protocol / Encryption / Shared secret / Key / Skype security / Index of cryptography articles / Cryptography / Key management / Cryptographic protocols

Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Add to Reading List

Source URL: www.crypttalk.com

Language: English - Date: 2015-02-20 10:27:12
23Index of cryptography articles / Stream cipher / FEAL / Cipher / WAKE / RC5 / Feistel cipher / Differential cryptanalysis / Cryptanalysis / Cryptography / Data Encryption Standard / Block cipher

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
24Key size / Integer factorization algorithms / RSA / Key / Cryptanalysis / Index of cryptography articles / Cryptography / Key management / Public-key cryptography

Universal security from bits and mips to pools, lakes – and beyond Arjen K. Lenstra1 with Thorsten Kleinjung1 and Emmanuel Thom´e2 1

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2014-01-09 15:36:00
25Key / Cryptanalysis / Public-key cryptography / Index of cryptography articles / Cryptography / ROT13 / Cipher

Cryptography Quiz – Unit 1; Chapter 1 What is the difference between a cipher and a code?

Add to Reading List

Source URL: betweenthenumbers.files.wordpress.com

Language: English - Date: 2015-04-04 21:47:48
26FEAL / Lecture Notes in Computer Science / International Cryptology Conference / Computational hardness assumptions / Cryptographic protocols / Diffie–Hellman problem / Index of cryptography articles / Cryptography / LOKI / Data Encryption Standard

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
27Vigenère cipher / Caesar cipher / RSA / Cryptosystem / Index of cryptography articles / Three-pass protocol / Cryptography / Public-key cryptography / Cipher

CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

Add to Reading List

Source URL: hkumath.hku.hk

Language: English - Date: 2014-11-18 19:29:03
28Key size / Public-key cryptography / Whitfield Diffie / Key-agreement protocol / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:43
29Key size / Whitfield Diffie / Public-key cryptography / Key-agreement protocol / Advanced Encryption Standard / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
30GSM / Cipher / Cryptanalysis / A5/2 / KASUMI / Index of cryptography articles / Cryptography / Stream ciphers / A5/1

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:27
UPDATE