Index of cryptography articles

Results: 178



#Item
21On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1  2

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
22Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Add to Reading List

Source URL: www.crypttalk.com

Language: English - Date: 2015-02-20 10:27:12
23This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
24Universal security from bits and mips to pools, lakes – and beyond Arjen K. Lenstra1 with Thorsten Kleinjung1 and Emmanuel Thom´e2 1

Universal security from bits and mips to pools, lakes – and beyond Arjen K. Lenstra1 with Thorsten Kleinjung1 and Emmanuel Thom´e2 1

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2014-01-09 15:36:00
25Key / Cryptanalysis / Public-key cryptography / Index of cryptography articles / Cryptography / ROT13 / Cipher

Cryptography Quiz – Unit 1; Chapter 1 What is the difference between a cipher and a code?

Add to Reading List

Source URL: betweenthenumbers.files.wordpress.com

Language: English - Date: 2015-04-04 21:47:48
26This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
27CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

Add to Reading List

Source URL: hkumath.hku.hk

Language: English - Date: 2014-11-18 19:29:03
28VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:43
29VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
30

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:27