Institute for Applied Information Processing and Communications

Results: 83



#Item
71Public safety / Cryptography / Computer network security / Computer security / Information security / Security engineering / Smart card / Cryptographic primitive / Institute for Applied Information Processing and Communications / Security / Crime prevention / National security

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 08:12:18
72Kryptonians / SHA-1 / Institute for Applied Information Processing and Communications / DC Comics / Cryptographic hash functions / Krypto

Finding SHA-1 Characteristics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:14:58
73Side channel attack / Luc / Cryptography Research / RSA / Fault injection / Cryptography / Power analysis / Institute for Applied Information Processing and Communications

The Non-Invasive Attack Testing Workshop (NIAT[removed]Accepted Papers Choosing Distinguishers for Differential Power Analysis Attacks Elisabeth Oswald, Luke Mather, and Carolyn Whitnall University of Bristol, Department o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-13 14:29:00
74Encryption / Keychain / Advanced Encryption Standard / Cold boot attack / Key derivation function / Brute-force attack / Dm-crypt / Password / Public-key cryptography / Cryptography / Disk encryption / Cryptographic software

Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-05-05 09:27:53
75Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
76ECRYPT / Cryptographic hash function / RIPEMD / PKCS / Block cipher / Symmetric-key algorithm / Key size / Institute for Applied Information Processing and Communications / Cipher / Cryptography / Public-key cryptography / Cryptographic software

ECRYPT  IST[removed]ECRYPT European Network of Excellence in Cryptology

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-11-19 10:24:39
77Risk analysis / Computer emergency response team / Network security / Public administration / International Conference on Availability /  Reliability and Security / European Network and Information Security Agency / Norbert Pohlmann / Institute for Applied Information Processing and Communications

www.nis-summer-school.eu speakers committees STEERING COMMITTEE •

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-09-22 08:34:20
78Institute for Applied Information Processing and Communications / Vincent Rijmen / SHA-1 / Graz / Hash list / Stream cipher / Cryptography / Cryptographic hash functions / Hashing

Hash & Stream The State of the Art for Cryptographic Hash Functions and for Stream Ciphers Feb[removed], 2007 Dept. of Mathematics, University of Salzburg

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
79Collision attack / Collision resistance / Institute for Applied Information Processing and Communications / Hash function / Collision / Vincent Rijmen / Public key fingerprint / Provably secure cryptographic hash function / Preimage attack / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - HashIntro_talk1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
80MD4 / Tiger / RIPEMD / SHA-2 / Institute for Applied Information Processing and Communications / Vincent Rijmen / FORK-256 / Hash list / Cryptanalysis / Cryptographic hash functions / Cryptography / SHA-1

Microsoft PowerPoint - AlternativeHashFunctions_talk5

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
UPDATE