Strong cryptography

Results: 135



#Item
31USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-05-14 16:00:09
32Password / Cryptography / Munged password

Perfect Passwords Target Audience Key Stage 3 Lesson Aim Pupils will increase their personal security online through recognising and creating strong and memorable passwords.

Add to Reading List

Source URL: www.childnet.com

Language: English - Date: 2013-03-07 10:01:50
33Microsoft Word - A new identity-based strong designated verifier signature scheme1115.doc

Microsoft Word - A new identity-based strong designated verifier signature scheme1115.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 03:09:27
34Optimization of Primality Testing Methods by GPU Evolutionary Search Steve Worley∗ Worley Laboratories Abstract Modern fast primality testing uses a combination of Strong Probable Prime (SPRP) rejection tests. We find

Optimization of Primality Testing Methods by GPU Evolutionary Search Steve Worley∗ Worley Laboratories Abstract Modern fast primality testing uses a combination of Strong Probable Prime (SPRP) rejection tests. We find

Add to Reading List

Source URL: www.gpgpgpu.com

Language: English - Date: 2009-07-05 06:33:15
35Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:12:00
36From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

Add to Reading List

Source URL: madiba.encs.concordia.ca

Language: English - Date: 2013-12-07 13:46:37
37NEWS RELEASE BIO-key® INTERNATIONAL, INC. TO ATTEND CA WORLD ‘14 Company to Showcase Fingerprint Biometric Authentication for CA Single Sign-On and CA Strong Authentication DATELINE, November 7, 2014 – BIO-key Inter

NEWS RELEASE BIO-key® INTERNATIONAL, INC. TO ATTEND CA WORLD ‘14 Company to Showcase Fingerprint Biometric Authentication for CA Single Sign-On and CA Strong Authentication DATELINE, November 7, 2014 – BIO-key Inter

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-11-07 08:34:30
38Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
39Trusted third party / Public key infrastructure / Information security / Encryption / Strong cryptography / Digital signature / Key escrow / Non-repudiation / Cryptography / Public-key cryptography / Key management

ii LICENSING OF TRUSTED THIRD PARTIES

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1998-09-10 19:47:04
40Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 12:50:42