Index of cryptography articles

Results: 178



#Item
1312007 Paper 3 Question 9  Introduction to Security (a) You have received a shipment of hardware random-number generators, each of which can output one 128-bit random number every 10 milliseconds. You suspect that one of t

2007 Paper 3 Question 9 Introduction to Security (a) You have received a shipment of hardware random-number generators, each of which can output one 128-bit random number every 10 milliseconds. You suspect that one of t

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:45
132Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:21:59
133Secure UHF Tags with Strong Cryptography Development of ISO/IEC[removed]Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19th, 2013

Secure UHF Tags with Strong Cryptography Development of ISO/IEC[removed]Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19th, 2013

Add to Reading List

Source URL: www.rfid-handbook.de

Language: English - Date: 2013-04-26 03:50:36
134IntelliSec L. Csirmaz: RSS and Secure Information Storage  Ramp secret sharing and

IntelliSec L. Csirmaz: RSS and Secure Information Storage Ramp secret sharing and

Add to Reading List

Source URL: www.renyi.hu

Language: English - Date: 2009-11-11 13:43:53
135Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math

Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math

Add to Reading List

Source URL: www.tark.org

Language: English - Date: 2011-10-23 10:31:50
136Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
137On the Security of IV Dependent Stream Ciphers

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
138John R. Black, Jr. Department of Computer Science 430 UCB

John R. Black, Jr. Department of Computer Science 430 UCB

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2013-07-25 13:12:31
139Microsoft PowerPoint - Rechberger_IDEA_v2

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-04-20 07:04:20
140New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-09-25 20:40:23