<--- Back to Details
First PageDocument Content
Malware / OO / Tor / Badbunny / Cryptographic primitive / Macintosh / Software / Portable software / OpenOffice.org
Date: 2014-12-16 19:06:29
Malware
OO
Tor
Badbunny
Cryptographic primitive
Macintosh
Software
Portable software
OpenOffice.org

OpenOffice v3.x Security Design Weaknesses Eric Filiol

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 826,52 KB

Share Document on Facebook

Similar Documents

Computer architecture / Instruction set architectures / Computing / Reduced instruction set computing / RISC-V / Cryptography / Cryptographic primitive / Instruction set / Institute for Applied Information Processing and Communications

Efficient Cryptography on RISC-V Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1qz0g - View Document

Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

DocID: 1qeWc - View Document

Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1q9PC - View Document

Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

DocID: 1pTjt - View Document

Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

DocID: 1mhYJ - View Document