Search


PDF Archive search engine
Last database update: 17 August at 11:24 - Around 76000 files indexed.


Show results per page

Results for «cryptographic»:


Total: 46 results - 0.018 seconds

BacTesWesley 100%

2.2 Cryptographic background .

https://www.pdf-archive.com/2014/02/28/bacteswesley/

28/02/2014 www.pdf-archive.com

Renegotiating TLS 94%

The ostensible reason for this is to allow either end to decide that it would like to refresh its cryptographic keys, increase the level of authentication, increase the strength of the cipher suite in use, or for any other reason.

https://www.pdf-archive.com/2013/09/29/renegotiating-tls/

29/09/2013 www.pdf-archive.com

MetaPay 87%

Smart contracts, cryptographic "boxes"

https://www.pdf-archive.com/2018/01/29/metapay/

29/01/2018 www.pdf-archive.com

whitepaper 81%

Zerocoin utilizes a cryptographic one-way accumulators and zero-knoweldge proofs which permit users to “convert” bitcoins to zerocoins and spend them using anonymous proof of ownership instead of explicit public-key based digital signatures.

https://www.pdf-archive.com/2016/09/14/whitepaper/

14/09/2016 www.pdf-archive.com

ArcBlock Token Sale 77%

  Purchasing,  holding  or  using  cryptographic  tokens  carries  significant  potential  financial,  regulatory  and other risks, including potential loss of the entire value of Payment.

https://www.pdf-archive.com/2018/02/04/arcblock-token-sale/

04/02/2018 www.pdf-archive.com

Introduction 72%

I will furnish a forum, for use for discussion of the puzzles – I will use it to disseminate the electronic copies, as well as to adjust the schedule of my cryptographic, steganographic, and other competition-related releases.

https://www.pdf-archive.com/2016/03/01/introduction/

01/03/2016 www.pdf-archive.com

Last CV 72%

education 1 school Grammar school, Veliky Ustyug 2001-2008 2 school Multi-disciplinary liceum, Vologda 2009-2012 3 university Department of Innovation and High Technology, MIPT • Algorithms and Data Structures(4 term course, C/C++) • Operating Systems • Databases • Parallel Programming • Python(Yandex Data School course) • Machine Learning • Game Theory(Yandex Data School course) • Cryptographic protocols • Present methods of applied statistics 2012-2016 4 master program Department of Innovation and High Technology, MIPT Russian/English 2016-current time experience 1 Python programming 2015 Python developing REP(clickable) (Reproducible Experiment Platform) – platform for machine learning.

https://www.pdf-archive.com/2017/03/08/last-cv/

08/03/2017 www.pdf-archive.com

AnonResume 72%

STEM Intern Department of Defense Summer 2015 • Implemented various cryptographic methods in Cryptol (Haskell-based domain specific language).

https://www.pdf-archive.com/2016/11/02/anonresume/

02/11/2016 www.pdf-archive.com

Zero-to-Monero-First-Edition-v0-11-1 71%

As we will show, it is possible to conceal participants of transactions, as well as the amounts involved, using cryptographic artifacts that nevertheless allow transactions to be verified and consensuated by the mining community.

https://www.pdf-archive.com/2018/05/01/zero-to-monero-first-edition-v0-11-1/

01/05/2018 www.pdf-archive.com

Zero-to-Monero-First-Edition-v0-11-2 71%

As we will show, it is possible to conceal participants of transactions, as well as the amounts involved, using cryptographic artifacts that nevertheless allow transactions to be verified and consensuated by the mining community.

https://www.pdf-archive.com/2018/05/03/zero-to-monero-first-edition-v0-11-2/

03/05/2018 www.pdf-archive.com

Tezos Contribution Terms 71%

The following Terms (“Terms”) govern the contribution procedure (“Contributions” collectively, and “Contribution” individually) to the Tezos Foundation (“TEZOS”) by contributors (“Contributors” collectively, and “Contributor” individually) and the subsequent genesis allocation of transferable cryptographic blockchain-based digital information units called tez (“XTZ”) to Contributors.

https://www.pdf-archive.com/2018/05/04/tezos-contribution-terms/

04/05/2018 www.pdf-archive.com

e-145689 70%

I Culture. I Globe. I Goal.

https://www.pdf-archive.com/2017/02/24/e-145689/

24/02/2017 www.pdf-archive.com

WhitePaperChainX1 69%

The mysterious e-money conventions of the 1980s and the 1990s were generally dependent on a cryptographic primitive known as Chaumian Blinding.

https://www.pdf-archive.com/2017/07/05/whitepaperchainx1/

05/07/2017 www.pdf-archive.com

blockchain real estate 67%

The cornerstone of such a system would be a strong identity solution that marries real world identities with cryptographic keypairs allowing for efficient exchange of encrypted and signed messages.

https://www.pdf-archive.com/2017/06/16/blockchain-real-estate/

16/06/2017 www.pdf-archive.com

Craig Brown Resume 66%

 Ensured that more than 3000 COMSEC and cryptographic materials are available to support all program requirements using EKMS (Electronic Key Management System).

https://www.pdf-archive.com/2016/09/05/craig-brown-resume/

05/09/2016 www.pdf-archive.com

SecureWinsock 66%

Modern cryptographic security is always changing as new standards begin challenging hackers to crack even more sophisticated algorithms, so I will examine the growing complexity of modern-day encryption and hash algorithms used to thwart these hackers’ attempts to crack the code.

https://www.pdf-archive.com/2016/01/02/securewinsock/

02/01/2016 www.pdf-archive.com

Mobile-Implants 64%

Encryption and mobile implants Not so long ago, in mobile messengers, the use of point-to-point encryption began.Such a cryptographic protocol provides for encryption of messages on the sender's device and decryption of messages on the recipient's device.This protocol is a fairly reliable solution the transmission of information.Was the method "point to point"

https://www.pdf-archive.com/2017/05/15/mobile-implants/

15/05/2017 www.pdf-archive.com

TermsofUser 62%

When you create a Wallet, the Services generate and store a cryptographic private and public key pair that you may use to send and receive Pipcoins via the Pipcoin network.

https://www.pdf-archive.com/2016/07/27/termsofuser/

27/07/2016 www.pdf-archive.com

Taming Asymmetric Network Delays 62%

Certain of these attacks can be detected by protocol constructs with cryptographic protection.

https://www.pdf-archive.com/2017/12/16/taming-asymmetric-network-delays/

16/12/2017 www.pdf-archive.com

GPC Specification-2.2.1 61%

26 4.3 Cryptographic support ..................................................................................................................................

https://www.pdf-archive.com/2017/06/09/gpc-specification-2-2-1/

09/06/2017 www.pdf-archive.com

BotGuard Infographic 61%

Cryptographic Puzzles Bot s and ot her aut omat ed request s will be easily filt ered by t he Bot Guard as it has t o survive t hrough a series of crypt ographic puzzles in order t o pass a simple t est :

https://www.pdf-archive.com/2017/03/02/botguard-infographic/

02/03/2017 www.pdf-archive.com

Assignment4-CryptoFS-SP17 60%

Cryptographic File System Dr.

https://www.pdf-archive.com/2017/06/03/assignment4-cryptofs-sp17/

03/06/2017 www.pdf-archive.com

ZOC SSH Features 56%

6 http://www.emtec.com/ What is a SSH-Client Secure Shell (SSH) is a cryptographic protocol that securely transports data over an unsecured network.

https://www.pdf-archive.com/2018/02/05/zoc-ssh-features/

05/02/2018 www.pdf-archive.com

assignment1 56%

Introduction In this part we will explore a relatively recent (2003) attack on widely used cryptographic software, discovered by Serge Vaudenay and co-workers at EPFL in Switzerland and reported in [1].

https://www.pdf-archive.com/2016/11/21/assignment1/

21/11/2016 www.pdf-archive.com