RSA

Results: 5605



#Item
271Algorithm / Mathematical logic / Theoretical computer science / Reinforcement learning / RSA / Online machine learning

 -  - -00-18 ËÁÁÅ Technical Report Discrete Prediction Games with Arbitrary Feedback and Loss

Add to Reading List

Source URL: archive.cone.informatik.uni-freiburg.de

Language: English - Date: 2006-04-01 17:58:02
272Cryptography / Alternative currencies / Cryptocurrencies / Zerocoin / Commitment scheme / Bitcoin / Zero-knowledge proof / Accumulator / Matthew D. Green / XTR / Prime number / RSA

Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System George Danezis Cédric Fournet

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English
273

Fraud Vulnerabilities in SiteKey Security at Bank of America Jim Youll <> CTO, Challenge/Response, LLC Cambridge, MA Review draft to Bank of America/RSA: June 26, 2006

Add to Reading List

Source URL: www.cr-labs.com

Language: English - Date: 2006-07-18 00:00:00
    274Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

    On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-08-21 05:45:15
    275Cryptographic software / Disk encryption / Email authentication / Cryptography / PGP / TrueCrypt / Pretty Good Privacy / Encryption / BlackBerry / Email encryption / RSA Security / GPGTools

    A Worldwide Survey of Encryption Products February 11, 2016 Version 1.0

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2016-02-11 00:03:04
    276Automated theorem proving / BurrowsAbadiNeedham logic / -calculus / Modal logic / RSA

    Analysis of Cryptographic Protocols using Logics of Belief: an Overview David Monniaux ´ Ecole Normale Sup´erieure

    Add to Reading List

    Source URL: www-verimag.imag.fr

    Language: English - Date: 2007-10-18 09:44:19
    277

    ` LA CRYPTOLOGIE » COURS ID12 « INTRODUCTION A COURS 6 ´ ´ CRYPTOGRAPHIE ASYMETRIQUE : SIGNATURE ET RSA EN DETAIL

    Add to Reading List

    Source URL: www.loria.fr

    Language: French - Date: 2005-11-15 07:10:45
      278

      AAECC 13, 17–Cryptanalysis of RSA with Small Prime Difference Benne de Weger

      Add to Reading List

      Source URL: deweger.xs4all.nl

      Language: English - Date: 2002-09-12 07:17:12
        279Cryptography / E-commerce / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Modular exponentiation / Ciphertext / Cryptanalysis / BlumGoldwasser cryptosystem / Rabin cryptosystem

        Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

        Add to Reading List

        Source URL: iacr.org

        Language: English - Date: 2010-11-05 17:58:40
        280Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

        Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

        Add to Reading List

        Source URL: www.ams.org

        Language: English - Date: 2015-03-10 15:36:10
        UPDATE