Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Cryptographic'
Cryptographic published presentations and documents on DocSlides.
Protecting Cryptographic Keys from Memory Disclosure Attack
by pasty-toler
Presented by John . Shu. Shouhuai. . Xu. and Ke...
I spent my first years in NSA doing research developing cryptographic components and secure systems
by test
Cryptographic systems serving the US government a...
Cryptographic Protocols
by yoshiko-marsland
Dan Fleck. CS 469: Security Engineering. These sl...
Combining Cryptographic Primitives to Prevent Jamming Attac
by myesha-ticknor
Abstract. The Open Nature of wireless medium leav...
Preventing Cryptographic Key Leakage in Cloud Virtual Machi
by marina-yarberry
Student: Fatemah Alharbi. Professor: Nael Abu-Gha...
Cryptographic Security
by alida-meadow
Presented by:. Josh Baker. October 9. th. , 2012....
MD5 Summary and Computer Examination Process
by myesha-ticknor
Introduction to Computer Forensics. Computer Exam...
Andrew Prout, William Arcand, David Bestor, Chansup Byun, Bill Bergeron, Matthew Hubbell, Jeremy Ke
by jane-oiler
2012 IEEE High Performance Extreme Computing Conf...
FPGA Security and Cryptographic Application Generating
by briana-ranney
Stream Cyphers. . Shemal Shroff. Shoaib. . Bhur...
FPGA Security and Cryptographic Application Generating
by briana-ranney
Stream Cyphers. . Shemal Shroff. Shoaib. . Bhur...
Data Integrity: Applications of Cryptographic
by mindeeli
Hash Functions. 12/7/2010. 1. Data Integrity. Mess...
Cryptographic Protocols Dan Fleck
by singh
CS 469: Security Engineering. These slides are mod...
Cryptographic Blackjack Alvin AuYoung and Christopher Tuttle CSE 207: Final Project, Spring 2004 University of Californi
by test
.ucsd.edu Abstract Internet casinos have become a ...
Cryptographic Cloud Storage Seny Kamara Microsoft Research senykmicrosoft
by ellena-manuel
com Kristin Lauter Microsoft Research klautermicro...
Cryptographic Shuing of Random and Pseudorandom Sequences Markus Dichtl Siemens Corporate Technology Email Markus
by tawny-fly
Dichtlsiemenscom Abstract This papers studies meth...
Annex C Approved Random Number Generators for FIPS PUB Security Requirements for Cryptographic Modules February Draft Randall J
by tawny-fly
Easter Carolyn French Information Technology Labo...
C ONTRIBUTED ESEARCH RTICLES Cryptographic Boolean Functions with R by Frdric Latte Dirk Van Heule and Julien Van hamme Abstract A new package called boolfun is avail able for R users
by karlyn-bohler
The package provides tools to handle Boolean func...
Annex A Approved Security Functions for FIPS PUB Security Requirements for Cryptographic Modules October Draft Randall J
by stefany-barnette
Easter Carolyn French Information Technology Labo...
Annex D Approved Key Establishment Techniques for FIPS PUB Security Requirements for Cryptographic Modules October Draft Randall J
by alida-meadow
Easter Carolyn French Information Technology Labo...
Ask a Better Question Get a Better Answer A New Approach to Private Data Analysis Cynthia Dwork Microsoft Research dworkmicrosoft
by luanne-stotts
com Abstract Cryptographic techniques for reasonin...
Hiding Cliques for Cryptographic Securit AriJuels Marc
by danika-pritchard
The problem in question is that of nding a large ...
CoercionResistant Cryptographic Voting Implementing Fr
by pasty-toler
Weber swebertkinformatiktudarmstadtde 1 Introduct...
Using Linear Congruential Generators for Cryptographic
by jane-oiler
In particular we choose email encryption as our c...
AlanTuringYear workshop Is Cryptographic Theory Practi
by trish-goza
KDW57347GR5734757347PHDQ57347E57347FUSWRJUDSKHU57...
NIST IR NIST Cryptographic Standards and Guidelines
by tatiana-dople
S Department of Commerce Penny Pritzker Secretary...
Chapter 8: Cryptographic Foibles Foible: a weakness or idiosyncrasy 1.
by debby-jeon
http://csrc.nist.gov/publications/fips/fips186-2/f...
Leakage-Resilient
by min-jolicoeur
. Cryptography. Stefan. . Dziembowski. Universi...
What's wrong with cryptographic API design
by pamella-moone
securely composing algorithms
Don’t get Stung
by ellena-manuel
(An introduction to the OWASP Top Ten Project). B...
Classical Cryptographic Protocols in a Quantum World
by alida-meadow
Fang . Song. Joint . work with Sean . Hallgren. ...
PAPERLESS BUSINESS
by alexa-scheidler
in GEORGIAN. FINANCIAL SECTOR. NANA ENUKIDZE - A...
Cryptographic Voting Systems
by tatiana-dople
(Ben . Adida. ). Jimin. Park. Carleton Universit...
The Cryptography Chronicles
by tatyana-admore
Andy Malone. CEO & Founder. The Cybercrime Se...
Discrete Mathematics
by test
Discrete . Mathematics. - . Coding Theory and...
Leakage-Resilient
by tatyana-admore
. Cryptography. Stefan. . Dziembowski. Universi...
Secure storage of cryptographic keys within random volumetr
by tatiana-dople
Roarke Horstmeyer. 1. , Benjamin Judkewitz. 1. , ...
Cryptographic Multilinear Maps:
by danika-pritchard
Applications, construction, Cryptanalysis. Diaman...
Business Convergence WS#2
by kittie-lecroy
Smart Grid Technologies and Project Use Cases. Em...
A High-Speed Elliptic Curve Cryptographic Processor
by myesha-ticknor
for Generic Curves over GF(. p. ). Yuan Ma, . Zon...
Security of Authentication Protocols
by calandra-battersby
Alexander . Potapov. Authentication definition. P...
Load More...