One-time pad

Results: 106



#Item
1

Raspberry Pi Secure messaging Cryptography: One Time Pad Nate Drake explains how your Pi can bring you to the very pinnacle of

Add to Reading List

Source URL: s3.amazonaws.com

- Date: 2017-01-27 05:11:24
    2Public-key cryptography / Cryptography / Key management / Blind signature / Electronic voting / Financial cryptography / Digital signature / Blinding / RSA / Key / Cryptographic protocol / One-time pad

    United States Patent] Chaum

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:08:14
    3Cryptography / Applied mathematics / Key management / Cipher / Cryptanalysis / Block cipher / One-time pad / Data Encryption Standard / Key / Index of cryptography articles / Book:Cryptography

    Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Add to Reading List

    Source URL: xn--bta-yla.net

    Language: English - Date: 2014-12-31 11:24:35
    4Security / Prevention / Computer access control / Identity documents / Access control / Cybercrime / Identity management / Password / Mobile security / Authentication / Transaction authentication number / Computer security

    Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:57
    5Cryptography / One-time pad / Quantum information science

    Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2011-02-08 04:57:46
    6Advantage / RSA / One-time pad / Ciphertext / Probabilistic encryption / Blum–Goldwasser cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

    Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-04-25 09:16:13
    7Advantage / Chosen-ciphertext attack / Initialization vector / Chosen-plaintext attack / Ciphertext / One-time pad / RSA / Cipher / Plaintext-aware encryption / Cryptography / Semantic security / Ciphertext indistinguishability

    U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    8One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

    CS 161 Computer Security Spring 2010

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2010-03-08 01:45:53
    9Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

    Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2007-02-27 09:35:26
    10Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

    CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-12-05 05:23:43
    UPDATE