Strong cryptography

Results: 135



#Item
31Crypto-1 / Stream cipher / KeeLoq / Block cipher / Radio-frequency identification / Cipher / Cryptanalysis / Strong cryptography / Key / Cryptography / Key management / MIFARE

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-05-14 16:00:09
32Password / Cryptography / Munged password

Perfect Passwords Target Audience Key Stage 3 Lesson Aim Pupils will increase their personal security online through recognising and creating strong and memorable passwords.

Add to Reading List

Source URL: www.childnet.com

Language: English - Date: 2013-03-07 10:01:50
33Designated verifier signature / Parity of a permutation / RSA / Signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Digital signature

Microsoft Word - A new identity-based strong designated verifier signature scheme1115.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 03:09:27
34Number theory / Prime number / Lucas–Lehmer primality test / CUDA / Probable prime / RSA / Trial division / Miller–Rabin primality test / Primality certificate / Primality tests / Mathematics / Cryptography

Optimization of Primality Testing Methods by GPU Evolutionary Search Steve Worley∗ Worley Laboratories Abstract Modern fast primality testing uses a combination of Strong Probable Prime (SPRP) rejection tests. We find

Add to Reading List

Source URL: www.gpgpgpu.com

Language: English - Date: 2009-07-05 06:33:15
35Password / Authentication / Man-in-the-middle attack / Strong authentication / Cryptographic protocols / Two-factor authentication / Anakam / Cryptography / Security / Computer security

Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:12:00
36Password / Passphrase / John the Ripper / Dictionary attack / Crack / Password manager / Computer security / Security / Cryptography

From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

Add to Reading List

Source URL: madiba.encs.concordia.ca

Language: English - Date: 2013-12-07 13:46:37
37Access control / Cryptography / Fingerprints / Surveillance / Authentication / Fingerprint recognition / Fingerprint / Password / Multi-factor authentication / Security / Biometrics / Identification

NEWS RELEASE BIO-key® INTERNATIONAL, INC. TO ATTEND CA WORLD ‘14 Company to Showcase Fingerprint Biometric Authentication for CA Single Sign-On and CA Strong Authentication DATELINE, November 7, 2014 – BIO-key Inter

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-11-07 08:34:30
38Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
39Trusted third party / Public key infrastructure / Information security / Encryption / Strong cryptography / Digital signature / Key escrow / Non-repudiation / Cryptography / Public-key cryptography / Key management

ii LICENSING OF TRUSTED THIRD PARTIES

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1998-09-10 19:47:04
40Randomness / Computational complexity theory / Information theory / Randomness extractor / Coding theory / Extractor / List decoding / Entropy / Min-entropy / Theoretical computer science / Applied mathematics / Cryptography

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 12:50:42
UPDATE