Strong cryptography

Results: 135



#Item
11Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PS

Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PS

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2016-02-05 15:46:07
12Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
13Cryptanalytic Tools  Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-12-11 07:25:27
14Strong Cryptography from Weak Secrets   Building Efficient PKE and IBE from Distributed Passwords

Strong Cryptography from Weak Secrets Building Efficient PKE and IBE from Distributed Passwords

Add to Reading List

Source URL: 2010.africacrypt.com

Language: English - Date: 2010-05-22 21:20:35
    15Strong Cryptography from Weak Secrets   Building Efficient PKE and IBE from Distributed Passwords

    Strong Cryptography from Weak Secrets Building Efficient PKE and IBE from Distributed Passwords

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2010-05-09 14:12:39
      16Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA  Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

      Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

      Add to Reading List

      Source URL: dedis.cs.yale.edu

      Language: English - Date: 2012-06-25 13:47:28
      17Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗  Elizabeth Thompson∗

      Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

      Add to Reading List

      Source URL: www.stat.washington.edu

      Language: English - Date: 2010-03-17 13:23:00
      18Published in Designs, Codes and Cryptography, 59(1/3):169–182, How (Not) to Design Strong-RSA Signatures Marc Joye  Abstract This paper considers strong-RSA signature schemes built from the scheme of

      Published in Designs, Codes and Cryptography, 59(1/3):169–182, How (Not) to Design Strong-RSA Signatures Marc Joye Abstract This paper considers strong-RSA signature schemes built from the scheme of

      Add to Reading List

      Source URL: joye.site88.net

      Language: English - Date: 2015-09-04 19:43:50
        19Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRJuly 6, 2015

        Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRJuly 6, 2015

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2015-07-09 08:43:04
        20

        PDF Document

        Add to Reading List

        Source URL: seclab.stanford.edu

        Language: English - Date: 2010-07-16 06:52:57