Crypto-1

Results: 298



#Item
91暗号プロトコル評価対象の概要	
  独立行政法人	
  情報通信研究機構 1.プロトコル名:IKEv2	
  2.関連する標準:RFC5996:	
 “Internet	
 Key	
 Exchange	
 Protocol	
 Version	
 2	
 (IKEv

暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:IKEv2 2.関連する標準:RFC5996: “Internet Key Exchange Protocol Version 2 (IKEv

Add to Reading List

Source URL: crypto-protocol.nict.go.jp

Language: Japanese - Date: 2015-10-20 00:24:04
    92暗号プロトコル評価結果 独立行政法人 情報通信研究機構  1.プロトコル名:PKMv2

    暗号プロトコル評価結果 独立行政法人 情報通信研究機構 1.プロトコル名:PKMv2

    Add to Reading List

    Source URL: crypto-protocol.nict.go.jp

    Language: English - Date: 2015-10-20 00:24:04
      93暗号プロトコル評価結果 独立行政法人 情報通信研究機構  1.プロトコル名:PKM

      暗号プロトコル評価結果 独立行政法人 情報通信研究機構 1.プロトコル名:PKM

      Add to Reading List

      Source URL: crypto-protocol.nict.go.jp

      Language: English - Date: 2015-10-20 00:24:04
        94暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構  1.プロトコル名:PKMv2 (Privacy and Key Management Protocol)

        暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:PKMv2 (Privacy and Key Management Protocol)

        Add to Reading List

        Source URL: crypto-protocol.nict.go.jp

        Language: Japanese - Date: 2015-10-20 00:24:04
          95暗号プロトコル評価結果 独立行政法人 情報通信研究機構  1.プロトコル名:Kerberos with ticket caching

          暗号プロトコル評価結果 独立行政法人 情報通信研究機構 1.プロトコル名:Kerberos with ticket caching

          Add to Reading List

          Source URL: crypto-protocol.nict.go.jp

          Language: Japanese - Date: 2015-10-20 00:24:04
            96CS255: Introduction to Cryptography  Winter 2015 Assignment #3: Solutions Problem 1. (a) We have eeve deve = 1 (mod ϕ(N )). Thus, ϕ(N ) divides eeve deve − 1.

            CS255: Introduction to Cryptography Winter 2015 Assignment #3: Solutions Problem 1. (a) We have eeve deve = 1 (mod ϕ(N )). Thus, ϕ(N ) divides eeve deve − 1.

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2015-03-15 20:33:19
            97CS255: Introduction to Cryptography  Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

            CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2015-03-01 19:29:53
            98CS255: Introduction to Cryptography  Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

            CS255: Introduction to Cryptography Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2015-02-12 00:12:50
              99CS255: Cryptography and Computer Security  Winter 2015 Assignment #1 Due: Wednesday, Jan. 28, 2015, in class.

              CS255: Cryptography and Computer Security Winter 2015 Assignment #1 Due: Wednesday, Jan. 28, 2015, in class.

              Add to Reading List

              Source URL: crypto.stanford.edu

              Language: English - Date: 2015-01-19 23:38:58
                100Programming Assignment 1  Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

                Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

                Add to Reading List

                Source URL: crypto.stanford.edu

                Language: English - Date: 2015-02-02 11:42:01