Cryptographic primitive

Results: 89



#Item
61Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
62Secure Shell / Transport Layer Security / OpenSSH / Padding / RSA / Block cipher modes of operation / Cryptographic primitive / Index of cryptography articles / Serge Vaudenay / Cryptography / Electronic commerce / Internet standards

C:/Documents and Settings/Gaven Watson/Desktop/thesis/final/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-09-17 04:30:43
63Cryptographic protocols / Ciphertext indistinguishability / ProVerif / ElGamal encryption / Digital signature / Cramer–Shoup cryptosystem / RSA / Cryptographic primitive / Computer security / Cryptography / Public-key cryptography / Electronic commerce

MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational Proofs

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-09-28 08:57:21
64Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
65Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
66Cryptographic primitive / National Institute of Standards and Technology / Cryptographic hash function / Science / Military communications / Military science / Cryptography / Ultra / Gaithersburg /  Maryland

The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies Danilo Gligoroski and Svein Johan Knapskog and Simona Samardjiska Presented by

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:15:30
67Cryptographic engineering / Side channel attack / Science / Cryptographic primitive / Algorithmic Number Theory Symposium / Cryptography / Espionage / Workshop on Cryptographic Hardware and Embedded Systems

Workshop on Cryptographic Hardware and Embedded Systems (CHES[removed]sponsored by IACR www.chesworkshop.org

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2013-02-20 16:50:26
68Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
69Electronic commerce / RSA / PKCS1 / PKCS / Optimal asymmetric encryption padding / Digital signature / Cryptographic primitive / Cryptosystem / CRYPTREC / Cryptography / Public-key cryptography / Cryptography standards

Report on Present State of RSA Cryptosystem/Signature Evaluation (full evaluation) January 28, 2002 Kazuo Ohta, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
70Key management / Public-key cryptography / Quantum key distribution / Secure Communication based on Quantum Cryptography / European Telecommunications Standards Institute / ETSI Satellite Digital Radio / Cryptographic primitive / Key size / Information-theoretic security / Cryptography / Quantum cryptography / Quantum information science

ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-06-04 11:14:44
UPDATE