Crypto-1

Results: 298



#Item
51

  CS 251: Bitcoin and Crypto Currencies Fall 2015  Homework 1 

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-10-21 12:44:04
    52Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / OpenSSL / Heartbleed / Key / GNU Privacy Guard / Public-key cryptography / SHA-1 / Password

    Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

    Add to Reading List

    Source URL: www.blu.org

    Language: English - Date: 2014-09-17 23:54:20
    53Computing / Cryptography / Secure communication / Security / Internet privacy / Crypto-anarchism / Mix network / Traffic analysis / Mixminion / Anonymous remailer / Denial-of-service attack / Len Sassaman

    Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:57
    54

    QTI Inline Crypto Engine (SDCC) VersionFIPSNon-Proprietary Security Policy Version 1.2 Last Update:

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-02-25 15:40:20
      55

      FIPSNon-Proprietary Security Policy: Java Crypto Module FIPSNon-Proprietary Security Policy Java Crypto Module Software Version 1.0

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-03-31 15:03:34
        56

        CS255: Winter 2015 PRPs and PRFs 1.  Abstract block ciphers:

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2015-12-30 19:53:54
          57

          Achieving Optimal Anonymity in Transferable E-cash with a Judge? Olivier Blazy1 , S´ebastien Canard2 , Georg Fuchsbauer3 , Aline Gouget4 , Herv´e Sibert5 , and Jacques Traor´e2 1

          Add to Reading List

          Source URL: crypto.rd.francetelecom.com

          Language: English - Date: 2011-09-15 06:42:39
            58

            Full Cryptanalysis of LPS and Morgenstern Hash Functions Christophe Petit1? , Kristin Lauter2 and Jean-Jacques Quisquater1?? 1 UCL Crypto Group? ? ? , 2 Microsoft Research.

            Add to Reading List

            Source URL: www.uclouvain.be

            Language: English - Date: 2011-12-14 05:30:36
              59

              Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions Fran¸cois-Xavier Standaert1 , Olivier Pereira1 , Yu Yu2 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de Louvain, Belgium.

              Add to Reading List

              Source URL: www.uclouvain.be

              Language: English - Date: 2013-09-12 08:45:35
                60

                1 IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1

                Add to Reading List

                Source URL: www.uclouvain.be

                Language: English - Date: 2011-12-14 05:30:34
                  UPDATE