Crypto-1

Results: 298



#Item
211Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-03-13 22:33:48
212Security / Cyberwarfare / Skype security / Kerberos / Password / Computer security / Security token

CS255 Programming Assignment #1 Programming Assignment #1 • Due: Friday Feb 10th (11:59pm) – Can use extension days

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-03 21:07:52
213Hashing / Message authentication codes / Search algorithms / Preimage attack / HMAC / Collision resistance / MD5 / CBC-MAC / Universal hashing / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
214Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53
215Cryptographic hash functions / Cryptography standards / Elliptic curve cryptography / SHA-2 / HMAC / PKCS / SHA-1 / Smart card / PCI Express / Cryptography / Cryptographic software / Error detection and correction

TrustWay Crypto PCI: an EAL4+ Common Criteria certified, ANSSI-qualified, cryptographic resource TrustWay® Crypto PCI is a cryptographic solution – 100% developed and manufactured in France by Bull – featuring the l

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2011-05-09 09:52:35
216Asiacrypt / International Cryptology Conference / Cryptography / Group signature / Eurocrypt

Scalable Group Signature with Revocation Benoit Libert1 , Thomas Peters1 , Moti Yung2 1 - Universit´ e catholique de Louvain, Crypto Group (Belgium) 2 - Columbia University and Google Inc. (USA)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
217Internet privacy / Crypto-anarchism / Virtual private network / Digi International / DiGi Telecommunications / Computer architecture / Technology / Computer network security / Computing / Network architecture

Digi Cellular VPN VPN Tunnel between Connect Wan 3G and Transport VC7400 1. Purpose The purpose of this document is to provide instructions in order to correctly configure and establish a VPN tunnel between a Digi Connec

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2013-09-19 16:51:19
218Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
219

ViPNet Common Crypto Core Security Policy FIPS[removed]Level 1 Validation Software Version 1.0

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-13 15:42:34
    220Software / Loadable kernel module / AES instruction set / FIPS 140 / Cryptographic Module Validation Program / Debian / Linux kernel / Advanced Encryption Standard / Crypto++ / Computer architecture / Cryptography standards / Cryptography

    McAfee NGFW Cryptographic Kernel Module FIPS[removed]Non-Proprietary Security Policy Version 2.1 Last Update: [removed]

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-10-27 16:32:56
    UPDATE