One-time pad

Results: 106



#Item
1Raspberry Pi Secure messaging  Cryptography: One Time Pad  Nate Drake explains how your Pi can bring you to the very pinnacle of

Raspberry Pi Secure messaging Cryptography: One Time Pad Nate Drake explains how your Pi can bring you to the very pinnacle of

Add to Reading List

Source URL: s3.amazonaws.com

- Date: 2017-01-27 05:11:24
    2United States Patent]  Chaum

    United States Patent] Chaum

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:08:14
    3Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Add to Reading List

    Source URL: xn--bta-yla.net

    Language: English - Date: 2014-12-31 11:24:35
    4Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

    Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:57
    5Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

    Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2011-02-08 04:57:46
    6Security II: Cryptography Markus Kuhn Computer Laboratory  Lent 2012 – Part II

    Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-04-25 09:16:13
    7U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

    U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    8CS 161  Computer Security Spring 2010

    CS 161 Computer Security Spring 2010

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2010-03-08 01:45:53
    9Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

    Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2007-02-27 09:35:26
    10CHAPTER  5 Cryptography ZHQM ZMGM ZMFM

    CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-12-05 05:23:43