<--- Back to Details
First PageDocument Content
Electronic commerce / Public-key cryptography / Cryptography standards / Hardware security module / Cryptographic primitive / ProVerif / Formal verification / Secure channel / Microsoft CryptoAPI / Cryptography / Cryptographic protocols / Cryptographic software
Date: 2012-03-14 05:31:34
Electronic commerce
Public-key cryptography
Cryptography standards
Hardware security module
Cryptographic primitive
ProVerif
Formal verification
Secure channel
Microsoft CryptoAPI
Cryptography
Cryptographic protocols
Cryptographic software

Prosecco Programming Securely with Cryptography A Project-Team Proposal Karthikeyan Bhargavan

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Download Document from Source Website

File Size: 734,22 KB

Share Document on Facebook

Similar Documents

Computer architecture / Instruction set architectures / Computing / Reduced instruction set computing / RISC-V / Cryptography / Cryptographic primitive / Instruction set / Institute for Applied Information Processing and Communications

Efficient Cryptography on RISC-V Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1qz0g - View Document

Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

DocID: 1qeWc - View Document

Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1q9PC - View Document

Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

DocID: 1pTjt - View Document

Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

DocID: 1mhYJ - View Document