Information and Communications University

Results: 569



#Item
71Advanced Encryption Standard / Flush / Side-channel attack / Tiny Encryption Algorithm

Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
72Cryptographic hash functions / Graz University of Technology / Hashing / Institute for Applied Information Processing and Communications / Error detection and correction / Cryptography / IAIK-JCE

A Case Against Currently Used Hash Functions in RFID Protocols

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-18 01:05:54
73HTML / Cascading Style Sheets / HTML element / Alt attribute / Tableless web design / Span and div / Framing / Adobe Flash / Web page / Web design / Fahrner Image Replacement

Manchester Metropolitan University Information and Communications Web Site Development Required Practices for Web Development Assignments In teaching web design as an academic subject we need standards by which we can ju

Add to Reading List

Source URL: www.ico.mmu.ac.uk

Language: English - Date: 2013-10-16 13:08:58
74Information technology / Communications technology / Information and communications technology / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

SOKOINE UNIVERSITY OF AGRICULTURE INFORMATION AND COMMUNICATION TECHNOLOGY POLICY

Add to Reading List

Source URL: www.sua.ac.tz

Language: English - Date: 2016-07-19 06:49:25
75Fingerprinting algorithms / Fingerprint / Identifiers / Flow / Bus / Tor

Control Flow based Code Fingerprinting Advisor(s): Mario Werner Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
76Scrypt / Key management / Cryptography / PBKDF2 / Key derivation function / Password / Cache / Crypt

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
77Instruction set architectures / Reconfigurable computing / Fabless semiconductor companies / Xilinx / Field-programmable gate array / RISC-V / Reduced instruction set computing

RISC-V on Sakura-G Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
78Mathematical optimization / Applied mathematics / Cryptography / Operations research / Search algorithms / Cryptanalysis / Metaheuristic / Linear cryptanalysis / Advanced Encryption Standard / Genetic algorithm

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
79UNESCO / Information and communication technologies for development / United Nations Development Group / Cultural diversity / Information for All Programme / North-Eastern Federal University / Cyberspace / Multilingualism / Language observatory

Ministry of Culture of the Russian Federation Federal Agency for Press and Mass Communications of the Russian Federation Government of the Republic of Sakha (Yakutia) Commission of the Russian Federation for UNESCO Russ

Add to Reading List

Source URL: www.ifapcom.ru

Language: English - Date: 2015-07-16 05:58:23
80Stream ciphers / Data Encryption Standard / Message authentication codes / Cryptography / VEST / Authenticated encryption / Py / DEAL / Index of cryptography articles

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
UPDATE