Attack time

Results: 284



#Item
261Seattle Mariners all-time roster / Classical cipher

Discovered_Attack_WS_answers

Add to Reading List

Source URL: www.rockfordchess.org

Language: English - Date: 2008-11-18 21:00:17
262Transient ischemic attack / The Stroke Association / Stroke recovery / Silent stroke / Stroke / Medicine / Health

Call[removed]Every Minute Counts During a stroke, time is brain and every minute counts. Death of brain cells begin with the first symptoms and

Add to Reading List

Source URL: www.strokesocal.org

Language: English - Date: 2013-08-02 18:44:31
263Internet protocols / IPv6 / Network Time Protocol / Time server / Anycast / NTP server misuse and abuse / Network address translation / IP multicast / Denial-of-service attack / Network architecture / Internet / Computing

COPING WITH OVERLOAD ON THE NETWORK TIME PROTOCOL PUBLIC SERVERS1 DAVID MILLS, UNIVERSITY OF DELEWARE, JUDAH LEVINE, NIST, RICHARD SCHMIDT, USNO, AND DAVID PLONKA, UNIVERSITY OF WISCONSIN Abstract

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2004-12-08 16:31:12
264Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
265Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
266Mathematics / Goppa code / Alternant code / McEliece cryptosystem / Reed–Solomon error correction / Linear code / Reed–Muller code / Algebraic geometry / Coding theory / Finite fields / Error detection and correction

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-13 14:34:46
267Affine cipher / Caesar cipher / Ciphertext / Cipher / Cryptanalysis / Known-plaintext attack / One-time pad / Vigenère cipher / Transposition cipher / Cryptography / Stream ciphers / Substitution cipher

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17

Add to Reading List

Source URL: www.math.sunysb.edu

Language: English - Date: 2010-04-15 11:12:49
268Computing / Loadable kernel module / Kernel / Vmlinux / Linux / Menuconfig / Initrd / Architecture of Windows NT / Ring / Computer architecture / Linux kernel / Software

Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring Anil Kurmus1 , Reinhard Tartler2 , Daniela

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 17:18:04
269Cipher / Floradora / Code / Known-plaintext attack / Cryptanalysis / One-time pad / Cryptography / Espionage / Cyberwarfare

How the Allies broke the German Diplomatic cipher Floradora. During World War 2, the Germans believed their two major diplomatic cryptographic systems were impregnable. Both were based on a

Add to Reading List

Source URL: www.cryptoden.com

Language: English - Date: 2012-08-05 04:37:06
270Hardware random number generator / Random number generation / Entropy / Pseudorandomness / One-time pad / Key / SHA-1 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

® THE INTEL RANDOM NUMBER GENERATOR

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2010-04-24 19:08:39
UPDATE