PDF Archive search engine
Last database update: 17 August at 11:24 - Around 76000 files indexed.

Show results per page

Results for «cryptographic»:

Total: 46 results - 0.018 seconds

BacTesWesley 100%

2.2 Cryptographic background .


Renegotiating TLS 94%

The ostensible reason for this is to allow either end to decide that it would like to refresh its cryptographic keys, increase the level of authentication, increase the strength of the cipher suite in use, or for any other reason.


MetaPay 87%

Smart contracts, cryptographic "boxes"


whitepaper 81%

Zerocoin utilizes a cryptographic one-way accumulators and zero-knoweldge proofs which permit users to “convert” bitcoins to zerocoins and spend them using anonymous proof of ownership instead of explicit public-key based digital signatures.


ArcBlock Token Sale 77%

  Purchasing,  holding  or  using  cryptographic  tokens  carries  significant  potential  financial,  regulatory  and other risks, including potential loss of the entire value of Payment.


Introduction 72%

I will furnish a forum, for use for discussion of the puzzles – I will use it to disseminate the electronic copies, as well as to adjust the schedule of my cryptographic, steganographic, and other competition-related releases.


Last CV 72%

education 1 school Grammar school, Veliky Ustyug 2001-2008 2 school Multi-disciplinary liceum, Vologda 2009-2012 3 university Department of Innovation and High Technology, MIPT • Algorithms and Data Structures(4 term course, C/C++) • Operating Systems • Databases • Parallel Programming • Python(Yandex Data School course) • Machine Learning • Game Theory(Yandex Data School course) • Cryptographic protocols • Present methods of applied statistics 2012-2016 4 master program Department of Innovation and High Technology, MIPT Russian/English 2016-current time experience 1 Python programming 2015 Python developing REP(clickable) (Reproducible Experiment Platform) – platform for machine learning.


AnonResume 72%

STEM Intern Department of Defense Summer 2015 • Implemented various cryptographic methods in Cryptol (Haskell-based domain specific language).


Zero-to-Monero-First-Edition-v0-11-1 71%

As we will show, it is possible to conceal participants of transactions, as well as the amounts involved, using cryptographic artifacts that nevertheless allow transactions to be verified and consensuated by the mining community.


Zero-to-Monero-First-Edition-v0-11-2 71%

As we will show, it is possible to conceal participants of transactions, as well as the amounts involved, using cryptographic artifacts that nevertheless allow transactions to be verified and consensuated by the mining community.


Tezos Contribution Terms 71%

The following Terms (“Terms”) govern the contribution procedure (“Contributions” collectively, and “Contribution” individually) to the Tezos Foundation (“TEZOS”) by contributors (“Contributors” collectively, and “Contributor” individually) and the subsequent genesis allocation of transferable cryptographic blockchain-based digital information units called tez (“XTZ”) to Contributors.


e-145689 70%

I Culture. I Globe. I Goal.


WhitePaperChainX1 69%

The mysterious e-money conventions of the 1980s and the 1990s were generally dependent on a cryptographic primitive known as Chaumian Blinding.


blockchain real estate 67%

The cornerstone of such a system would be a strong identity solution that marries real world identities with cryptographic keypairs allowing for efficient exchange of encrypted and signed messages.


Craig Brown Resume 66%

 Ensured that more than 3000 COMSEC and cryptographic materials are available to support all program requirements using EKMS (Electronic Key Management System).


SecureWinsock 66%

Modern cryptographic security is always changing as new standards begin challenging hackers to crack even more sophisticated algorithms, so I will examine the growing complexity of modern-day encryption and hash algorithms used to thwart these hackers’ attempts to crack the code.


Mobile-Implants 64%

Encryption and mobile implants Not so long ago, in mobile messengers, the use of point-to-point encryption began.Such a cryptographic protocol provides for encryption of messages on the sender's device and decryption of messages on the recipient's device.This protocol is a fairly reliable solution the transmission of information.Was the method "point to point"


TermsofUser 62%

When you create a Wallet, the Services generate and store a cryptographic private and public key pair that you may use to send and receive Pipcoins via the Pipcoin network.


Taming Asymmetric Network Delays 62%

Certain of these attacks can be detected by protocol constructs with cryptographic protection.


GPC Specification-2.2.1 61%

26 4.3 Cryptographic support ..................................................................................................................................


BotGuard Infographic 61%

Cryptographic Puzzles Bot s and ot her aut omat ed request s will be easily filt ered by t he Bot Guard as it has t o survive t hrough a series of crypt ographic puzzles in order t o pass a simple t est :


Assignment4-CryptoFS-SP17 60%

Cryptographic File System Dr.


ZOC SSH Features 56%

6 What is a SSH-Client Secure Shell (SSH) is a cryptographic protocol that securely transports data over an unsecured network.


assignment1 56%

Introduction In this part we will explore a relatively recent (2003) attack on widely used cryptographic software, discovered by Serge Vaudenay and co-workers at EPFL in Switzerland and reported in [1].