Cryptographic primitive

Results: 89



#Item
71Cryptography / Science / Radio-frequency identification / Cryptographic primitive / ECRYPT / Authentication protocol / Smart card / Computing / Index of cryptography articles / Ubiquitous computing / Technology / ISO standards

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:04:13
72Cryptographic protocols / Key management / Secure Communication based on Quantum Cryptography / Quantum key distribution / Cryptographic primitive / Public-key cryptography / Symmetric-key algorithm / Man-in-the-middle attack / Key size / Cryptography / Quantum cryptography / Quantum information science

New Journal of Physics The open–access journal for physics Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger1 and Gaby Lenhart2

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2009-05-28 06:20:00
73Cryptographic hash function / Key size / Block cipher / CRYPTREC / FIPS 140-2 / Cryptography / Cryptographic primitive / Symmetric-key algorithm

Procedure for submitting cryptographic techniques (Provisional Translation) Information-technology Promotion Agency, Japan June 13, 2000 Final Version July 5, [removed]Purpose of this Project

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
74Cryptographic hash function / Block cipher / Cryptographic primitive / Pseudorandom number generator / Stream cipher / Digital signature / Key size / CRYPTREC / FIPS 140-2 / Cryptography / Key management / Symmetric-key algorithm

Procedure for submitting cryptographic techniques (Provisional Translation) Information-technology Promotion Agency, Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
75Side channel attack / Full Domain Hash / Cryptanalysis / Diffie–Hellman problem / RSA / Cryptographic primitive / Index of cryptography articles / Cryptography / Public-key cryptography / PKCS

1 Jean-S´ ebastien Coron Curriculum Vitae

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-06-06 06:50:45
76Finite fields / Finite field arithmetic / Hamming weight / Elliptic curve cryptography / 64-bit / Vector space / FO / DEC Alpha / Parallel computing / Algebra / Mathematics / Abstract algebra

Breaking ECC2K-130 Abstract. Elliptic-curve cryptography is becoming the standard public-key primitive not only for mobile devices but also for high-security applications. Advantages are the higher cryptographic strength

Add to Reading List

Source URL: www.ecc-challenge.info

Language: English - Date: 2009-11-18 08:18:30
77Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:33:10
78Software / Internet protocols / Cryptographic protocols / IPsec / Microsoft CryptoAPI / Cryptlib / Cryptographic primitive / Kernel / Packet Processing / Computing / Cryptographic software / Cryptography

Cryptography As An Operating System Service: A Case Study ANGELOS D. KEROMYTIS Columbia University JASON L. WRIGHT and THEO DE RAADT OpenBSD Project

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:33:13
79Information / Communicating sequential processes / Communications protocol / Cryptographic primitive / Public-key cryptography / Model checking / Yahalom / Burrows–Abadi–Needham logic / Protocol / Cryptographic protocols / Cryptography / Data

The Modelling and Analysis of Security Protocols: the CSP Approach P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe and A.W. Roscoe

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2010-12-15 14:57:33
80Electronic commerce / Public-key cryptography / Cryptography standards / Hardware security module / Cryptographic primitive / ProVerif / Formal verification / Secure channel / Microsoft CryptoAPI / Cryptography / Cryptographic protocols / Cryptographic software

Prosecco Programming Securely with Cryptography A Project-Team Proposal Karthikeyan Bhargavan

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-03-14 05:31:34
UPDATE