Attack time

Results: 284



#Item
61Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
62Computer network security / Hacking / Zero-day attack / Vulnerability / 0D / Failure / Deadline / Exploit / Time limit / Computer security / Cyberwarfare / Software testing

Project Zero Make 0day Hard The mission statement: Make 0day hard.

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:02
63Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
64Birds of Western Australia / Puffinus / Protected areas of Tasmania / Short-tailed Shearwater / Shearwater / Seabird / Muttonbirding / Birds of Australia / Geography of Tasmania / Birds of New Zealand

Media Release 30th March 2012 TASMANIAN AUTUMN KILLING TIME CONTINUES Against Animal Cruelty Tasmania (AACT) and the Tasmanian Conservation Trust (TCT) are leading the attack on the recreational killing of short-tailed s

Add to Reading List

Source URL: www.tct.org.au

Language: English - Date: 2012-12-19 20:56:56
65Environmental education / Scarecrow / Teacher / E-learning / Education / Teaching / Lesson

- sense of taste: selection of foods from Farmer Greens farm are shared with the children during morning tea or snack attack/brain break time Planting seeds/seedlings/cuttings to explain how new plants may be grown on th

Add to Reading List

Source URL: amarooeec.eq.edu.au

Language: English - Date: 2014-09-08 01:11:49
66Stream cipher / Chosen-plaintext attack / Block cipher / One-time pad / Cipher / RSA / Ciphertext indistinguishability / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

CS255: Cryptography and Computer Security Winter 2004 Assignment #1 Due: Wednesday, Jan. 28th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-20 16:42:25
67Stream ciphers / Ciphertext / RSA / One-time pad / Chosen-plaintext attack / Block cipher / Cipher / Paillier cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2001 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-01-25 15:17:18
68One-time pad / Chosen-plaintext attack / Cipher / RSA / Triple DES / Key clustering / Cryptography / Ciphertext / Block cipher

CS255: Cryptography and Computer Security Winter 2003 Assignment #1 Due: Wednesday, February 5th, 2003. In class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-27 01:54:54
69Chosen-plaintext attack / Cipher / Block cipher / RSA / DES-X / Ciphertext indistinguishability / Malleability / Cryptography / Ciphertext / One-time pad

CS255: Cryptography and Computer Security Winter 2000 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-11 23:12:09
70Cipher / Block cipher / Stream cipher / One-time pad / RSA / Vigenère cipher / Triple DES / Cryptography / Ciphertext / Chosen-plaintext attack

CS255: Cryptography and Computer Security Winter 2007 Assignment #1 Due: Wednesday, Jan. 31st, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-24 01:30:06
UPDATE