Ad
related to: recent trends in cryptography and security research related to technology
Search results
Results From The WOW.Com Content Network
The Cryptology ePrint Archive is an electronic archive of new results in the field of cryptography, maintained by the International Association for Cryptologic Research. It contains articles covering many of the most recent advances in cryptography, that did not necessarily undergo any refereeing process. [1]
The Journal of Cryptology (ISSN 0933-2790) is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by the International Association for Cryptologic Research. Its editor-in-chief is Vincent Rijmen. [1]
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms (usually public-key algorithms) that are currently thought to be secure against a cryptanalytic attack by a quantum computer.
"For opening up new areas in cryptography and computer security, for innovative educational initiatives in cryptography, and for service to the IACR." Moti Yung: 2014 "For fundamental and innovative contributions to cryptography and its application to the security and privacy of real world systems." Eyal Kushilevitz: 2014
Indeed, one of the four grand research challenges in information security and assurance identified by the Computing Research Association in 2003 is: "Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future." This is the challenge that CUPS strives to address.
Emerging technology Status Potential applications Related articles Active structure: Research, development, commercialization Adaptive structures that respond to different conditions, or supermassive buildings and infrastructure (e.g. space fountains)
The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the fields of Computer Science, Applied Mathematics, Engineering, Information Theory, Data Encryption, etc. [1] It consists of 460 articles in alphabetical order and is available electronically and in print.
Padding (cryptography) • Padding oracle attack • Paillier cryptosystem • Pairing-based cryptography • Panama (cryptography) • Partitioning cryptanalysis • Passive attack • Passphrase • Password • Password-authenticated key agreement • Password cracking • Password Hashing Competition • Paul Kocher • Paulo Pancatuccio ...