Cryptographic engineering

Results: 331



#Item
1

Published in Journal of Cryptographic Engineering, 6(3):187–199, Inversion-Free Arithmetic on Elliptic Curves Through Isomorphisms Raveen R. Goundar · Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-08-27 14:33:22
    2

    Published in Journal of Cryptographic Engineering 1(2):161–176, Scalar Multiplication on Weierstraß Elliptic Curves from Co-Z Arithmetic Raveen R. Goundar · Marc Joye · Atsuko Miyaji · Matthieu Rivain · Ale

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:36
      3Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

      AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2015-02-21 21:04:37
      4Electronic engineering / Digital electronics / Electronics / Electronic design automation / Electronic design / Logic in computer science / Cryptographic protocols / Garbled circuit / Boolean circuit / Sequential logic / Logic synthesis / Standard cell

      2015 IEEE Symposium on Security and Privacy TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:43:20
      5Software / Computing / System software / Computer access control / Password / Security / Cryptography / Pass / Cryptographic software / Challengeresponse authentication / HTTP cookie / Android

      Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:05
      6Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Bloom filter / Cuckoo hashing / Randomness extractor / Cryptographic hash function

      Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

      Add to Reading List

      Source URL: www.eecs.harvard.edu

      Language: English - Date: 2007-11-16 13:42:30
      7Cryptography / Software engineering / E-commerce / RSA / Secure multi-party computation / ALGOL 68 / Const / Method / Public-key cryptography / Apache Avro

      L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

      Add to Reading List

      Source URL: www.fkerschbaum.org

      Language: English - Date: 2009-09-30 17:02:37
      8Computing / Cryptography / Software engineering / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / E-commerce / Transmission Control Protocol / HTTPS / Password / HTTP cookie / OpenSSL

      Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:05
      9Cryptography / Cryptographic engineering / USENIX / Cryptographic protocol / Institute for Applied Information Processing and Communications / Zero-knowledge proof / Communications protocol

      Crypto Compiler Advisor(s): David Derler, Christian Hanser, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      Language: English - Date: 2015-09-08 06:00:03
      10Internet / Computing / Cryptographic protocols / Cryptography / X.509 / Internet Architecture Board / Housley / Internet Engineering Task Force / S/MIME / IEEE 802.11i-2004

      Mr. Housley is the Founder of Vigil Security, LLC, and he is coauthor of “Planning for PKI” and “Implementing Email and Security Tokens” published by John Wiley & Sons. He has over 30 years of communications and

      Add to Reading List

      Source URL: www.ianacg.org

      Language: English - Date: 2015-02-06 01:41:13
      UPDATE