Crypto

Results: 1625



#Item
151

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

Add to Reading List

Source URL: fc17.ifca.ai

- Date: 2017-03-17 11:54:08
    152

    ‫מס׳ מחברת‪:‬‬ ‫ת‪.‬ז‪:.‬‬ ‫מבחן בקורס ״מבוא לקריפטוגרפיה מודרנית״‬ ‫סמסטר א׳ התש״ע‪ ,‬מועד א׳‬

    Add to Reading List

    Source URL: tau-crypto-f13.wdfiles.com

    - Date: 2013-10-16 13:27:03
      153

      PDF Document

      Add to Reading List

      Source URL: tau-crypto-f13.wdfiles.com

      - Date: 2014-01-15 04:55:32
        154

        Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig

        Add to Reading List

        Source URL: www.math.auckland.ac.nz

        - Date: 2014-01-05 18:06:58
          155

          SILC Is INT-RUP Secure∗ Tetsu Iwata† , Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi Early Symmetric Crypto (ESCJanuary 16–20, 2017, Canach, Luxembourg

          Add to Reading List

          Source URL: www.cryptolux.org

          - Date: 2017-01-18 08:28:37
            156

            Thinking about Cryptography: Crypto Flaws and How to Avoid Them Jonathan Katz Some good news and some bad news…

            Add to Reading List

            Source URL: cybersec-prod.s3.amazonaws.com

            - Date: 2016-12-05 15:17:30
              157

              Dash: A Privacy­Centric Crypto­Currency    Evan Duffield ­ ​   Daniel Diaz ­ ​  

              Add to Reading List

              Source URL: www.dash.org

              - Date: 2015-11-16 14:59:09
                158

                Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-06-18 08:39:54
                  159

                  Key-collisions in (EC)DSA: Attacking Non-repudiation* Tomáš Rosa http://crypto.hyperlink.cz, email: Abstract. A new kind of attack on the non-repudiation property of digital signature schemes is present

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2004-01-10 08:28:36
                    160

                    SECURITY INNOVATION N TR U Q UAN TUM-SAFE , S T AN DA R DIZ ED C R Y PTO Quantum computing will immediately break the most commonly used asymmetric crypto solutions in the market today – RSA and ECC. Quantum-proof cry

                    Add to Reading List

                    Source URL: assets.securityinnovation.com

                    - Date: 2016-04-21 15:23:27
                      UPDATE