Cryptology ePrint Archive
- Cryptology ePrint Archive
-
The Cryptology ePrint Archive is an electronic archive (eprint) of new results in the field of cryptography, maintained by the International Association for Cryptologic Research. It contains articles covering many of the most recent advances in cryptography.
External links
Categories:
- Cryptography stubs
- Cryptography journals
Wikimedia Foundation.
2010.
Look at other dictionaries:
MD5 — General Designers Ronald Rivest First published April 1992 Series MD2, MD4, MD5, MD6 Detail Digest sizes 128 bits … Wikipedia
SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms … Wikipedia
Proof-of-work system — A Proof of work ( POW ) system (or protocol, or function) is an economic measure to deter denial of service attacks and other service abuses such as spams on a network by requiring some work from the service requester, usually meaning processing… … Wikipedia
Attaque par relais — Une attaque par relais, connu en anglais sous le nom de relay attack, est un type d attaque informatique, similaire à l attaque de l homme du milieu et l attaque par rejeu, dans lequel un attaquant ne fait que relayer mot pour mot un message d un … Wikipédia en Français
Kryptologische Hashfunktion — Eine kryptologische Hashfunktion oder kryptographische Hashfunktion ist eine spezielle Form der Hashfunktion, welche zusätzlich kollisionsresistent oder eine Einwegfunktion (oder beides) ist. Eine Hashfunktion ist eine Funktion, die eine… … Deutsch Wikipedia
ISAAC (cipher) — In cryptography, ISAAC is a pseudorandom number generator and a stream cipher designed by Robert Jenkins (1996) to be cryptographically secure. The name is an acronym for Indirection, Shift, Accumulate, Add, and Count. [Robert J. Jenkins Jr.,… … Wikipedia
MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… … Wikipedia
RC4 — (англ. Rivest Cipher 4 или англ. Ron’s Code, также известен как ARCFOUR или ARC4 (англ. Alleged RC4)) потоковый шифр, широко применяющийся в различных системах защиты информации в компьютерных сетях (например, в протоколах… … Википедия
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Distance-bounding protocol — Les Distance bounding protocols[note 1] sont des protocoles de sécurité qui permettent à un vérificateur V de s assurer qu un prouveur P se trouve à une distance bornée et définie de lui même. Ces protocoles sont issus des travaux réalisés par… … Wikipédia en Français