×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [keyed hash function]
Technology
Securing Wireless Cellular Systems
8.144 views
Technology
Lecture 2 crypto and basics of protocols
276 views
Documents
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups
217 views
Documents
Rennes, 23/10/2014 Cristina Onete
[email protected]
Commitment Schemes and Identification/Authentication
213 views
Engineering
Chaos Based Direct Public Verifiable Signcryption Scheme
56 views
Data & Analytics
Digital signature Brief Introduction
140 views
Documents
Chapter 11 Cryptographic Hash Functions. “Each of the messages, like each one he had ever read of Stern's commands, began with a number and ended with
221 views
Documents
1 Adaptive Witness Encryption and Asymmetric Password-based Cryptography PKC 2015 March 31, 2015 Mihir Bellare UC San Diego Viet Tung Hoang University
244 views
Documents
Cisco Solution Technology Integrator Криптография: основные понятия и алгоритмы Рябко С.Д., к.ф.-м.н. СТАНДАРТ СЕТЕВОЙ
236 views
Documents
Cross-Domain Privacy-Preserving Collaborative Firewall Optimization Fei Chen Computer Science and Engineering Michigan State University Joint work with
213 views
Documents
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect
217 views
Documents
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
23 views
Next >