Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
problems functions » problems fiction, process functions, problems directions
functions https » foundations https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
problems functions » problems fiction, process functions, problems directions
functions https » foundations https
securing https » security https, security http, securing rtp
1
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
2
Table of Contents:
“...Preface -- C0-Semigroup of Linear Operators and Cauchy Problems -- Statement of the Problems...”
View full text
View full text
Electronic
eBook
3
by Boon, Chian Tea, Kamel Ariffin, Muhammad Rezal, Abd Ghafar, Amir Hamzah, Sapar, Siti Hasana, Mohamat Johari, Mohamat Aidil
Published 2022
“..., in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP...”Published 2022
Article
4
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“...Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“...Theory of Security with Noisy Data -- Unbreakable Keys from Random Noise -- Fuzzy Commitment -- A...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“...Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”View full text
Electronic
eBook
18
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
19
Published 2011
Subjects:
“...Algorithm Analysis and Problem Complexity. https://scigraph.springernature.com/ontologies/product...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook



