Crypto-1

Results: 298



#Item
201Advanced Encryption Standard / Cryptographic software / FIPS 140-2 / FIPS 140 / Block cipher modes of operation / HMAC / Zeroisation / Crypto++ / AES implementations / Cryptography / Cryptography standards / Message authentication codes

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49
202RSA / Finite fields / Elliptic Curve DSA / Diffie–Hellman key exchange / Digital signature / Digital Signature Algorithm / SHA-1 / Subliminal channels / ElGamal signature scheme / Cryptography / Public-key cryptography / Electronic commerce

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
203Computer architecture / Internet privacy / Crypto-anarchism / Virtual private network / Network switch / IP address / Router / VoIP VPN / Cisco 837 / Computer network security / Computing / Network architecture

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE V IR TUAL PRIVATE NETWORKS

Add to Reading List

Source URL: www.vpnc.org

Language: English - Date: 2011-09-08 14:28:08
204Computing / Crypto-anarchism / Computer architecture / Network security / Computer security / Virtual private networks / Computer network security / Internet privacy / Network architecture

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Figure 4-5: VPN Consortium Scenario 1

Add to Reading List

Source URL: www.vpnc.org

Language: English - Date: 2009-08-29 23:25:21
205Linear congruence theorem / Lattice problem / Mathematics / Modular arithmetic / Cryptography

Extended Hidden Number Problem and Its Cryptanalytic Applications Martin Hlav´ aˇc1, and Tom´ aˇs Rosa1,2 1

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2010-02-03 01:38:10
206Network architecture / Ethernet / Crypto-anarchism / Virtual private network / Computer architecture / Cisco Systems / Network switch / Electronics / Network Extrusion / Computer network security / Computing / Internet privacy

Cisco VPN 3000 Series Concentrators Interoperability Profile Overview This document describes how to configure VPN 3000 Series Concentrators to implement Scenario 1 that the VPN Consortium specifies in “Documentation P

Add to Reading List

Source URL: www.vpnc.org

Language: English - Date: 2002-12-08 18:58:33
207Computing / Crypto-anarchism / Virtual private network / Computer architecture / Cyberwarfare / Tunneling protocols / Split tunneling / Computer network security / Internet privacy / Network architecture

Microsoft Word[removed]#[removed]Connecting to the UNSW Canberra VPN from Windows 8 and 8-1.DOCX

Add to Reading List

Source URL: icts.unsw.adfa.edu.au

Language: English - Date: 2015-02-22 22:09:21
208

Vondruška, P.: Kryptologie, šifrování a tajná písma, nakladatelství Albatros, edice OKO, Praha, 2006 Ukázka z kapitoly 3. Šifry, které nikdy skutečnými šiframi nebyly Jednoduchá záměna č. 1 (knihy) K la

Add to Reading List

Source URL: crypto-world.info

Language: Czech - Date: 2006-09-29 18:22:48
    209Mathematics / Estimation theory / Statistical theory / Quicksort / Science

    Lecture 3, April 10, Examples T (n) = 2T (n / 2) + Θ (n) nlgb a = nlg 2 2 = n Θ (n) / n = Θ (1) = Θ (lg0 n) ⇒

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2001-04-15 14:55:01
    210Cipher / Block cipher / Chosen-plaintext attack / Advantage / Symmetric-key algorithm / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

    CS255: Cryptography and Computer Security Winter 2015 Assignment #1 Due: Wednesday, Jan. 28, 2015, in class.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-01-19 23:38:58
    UPDATE