Cryptographic nonce

Results: 122



#Item
1Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-02-21 21:04:37
2Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
3Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 13:04:18
4Transmission Control Protocol / Cryptographic nonce / Checksum

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
5Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: www.iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
6Computer access control / Cryptography / Computer security / Distance-bounding protocol / Security / Ubiquitous computing / Challengeresponse authentication / Radio-frequency identification / IP / Security token / NP / Cryptographic nonce

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
7Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
8Bitcoin / Cryptocurrencies / Financial technology / Bitcoin network / E-commerce / Cryptographic nonce / Blockchain / Money / Draft:Bitcoin address

Lecture 4 All about mining Joseph Bonneau Recap: Bitcoin miners

Add to Reading List

Source URL: bitcoinschool.gr

Language: English - Date: 2016-05-31 08:03:55
9Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-07-06 12:46:22
10Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
UPDATE