<--- Back to Details
First PageDocument Content
Cryptography / Internet / Internet Standards / Computing / Public-key cryptography / Key management / Domain name system / Routing protocols / Domain Name System Security Extensions / Resource Public Key Infrastructure / DNS spoofing / BGP hijacking
Cryptography
Internet
Internet Standards
Computing
Public-key cryptography
Key management
Domain name system
Routing protocols
Domain Name System Security Extensions
Resource Public Key Infrastructure
DNS spoofing
BGP hijacking

Internet Kill Switches Demystified Benjamin Rothenberger ETH Zürich

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 270,71 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Algebra / Mathematics / Abstract algebra / Polynomials / Computer algebra / Multivariate cryptography / Algebraic geometry / Equations / Hidden Field Equations / Factorization / Quadratic function / Grbner basis

Multivariate Public Key Cryptography Jintai Ding 1 2

DocID: 1xVdX - View Document

Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

DocID: 1xTwC - View Document

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

DocID: 1vi5X - View Document