Eprint

Results: 2085



#Item
731Deduction / Q / Entailment / RC4 / I1 / Logic / Cryptography / Functional languages

Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University) Abstract. A large number of stream cipher were proposed and impleme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-11 15:22:27
732Computer printers / Office equipment / Information technology management / Hewlett-Packard / HP ePrint / Tablet computer / HP-UX / HP Pavilion / Computing / Technology / Computer hardware

HP recommends Windows. Just what the doctor ordered HP ElitePad Go beyond every day mobility. Grab the tablet that helps deliver the very best in patient care.

Add to Reading List

Source URL: www.hp.com

Language: English - Date: 2013-04-01 18:33:51
733Trivium / Linear cryptanalysis / Differential cryptanalysis / Stream ciphers / Grain / Cube attack

Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-20 11:59:02
734Block cipher modes of operation / Block cipher / Ciphertext / RSA / PKCS / Triple DES / Tiny Encryption Algorithm / Cryptography / Public-key cryptography / Padding

Strengthened Encryption in the CBC Mode Vlastimil Klíma 1 and Tomáš Rosa 1,2 1 ICZ, V Olšinách 75, Prague 10, Czech Republic, http://www.i.cz Department of Computer Science and Engineering, Faculty of Electri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-28 08:36:04
735Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-05-12 08:40:12
736Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45
737Radio electronics / Wireless / Radio-frequency identification / Keyless Go / Automatic identification and data capture / Smart key / Remote keyless system / Antenna / Relay attack / Technology / Electronic engineering / Telecommunications engineering

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris Danev, Srdjan Capkun Department of Computer Science ETH Zurich 8092 Zurich, Switzerland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-21 16:52:49
738Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
739Encumbrance / Real estate

Microsoft Word - EPrint Self Service quick ref for web.doc

Add to Reading List

Source URL: training.nmsu.edu

Language: English - Date: 2013-07-11 13:28:00
740Technology / Printing / Printer / Oxford University Press / HP ePrint / HP Universal Print Driver / Computer printers / Office equipment / Media technology

Consumer Market Research Findings

Add to Reading List

Source URL: www.infotrends.com

Language: English
UPDATE