When.com Web Search

  1. Ad

    related to: recent trends in cryptography and security research related to technology

Search results

  1. Results From The WOW.Com Content Network
  2. Cryptology ePrint Archive - Wikipedia

    en.wikipedia.org/wiki/Cryptology_ePrint_Archive

    The Cryptology ePrint Archive is an electronic archive of new results in the field of cryptography, maintained by the International Association for Cryptologic Research. It contains articles covering many of the most recent advances in cryptography, that did not necessarily undergo any refereeing process. [1]

  3. Journal of Cryptology - Wikipedia

    en.wikipedia.org/wiki/Journal_of_Cryptology

    The Journal of Cryptology (ISSN 0933-2790) is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by the International Association for Cryptologic Research. Its editor-in-chief is Vincent Rijmen. [1]

  4. Post-quantum cryptography - Wikipedia

    en.wikipedia.org/wiki/Post-quantum_cryptography

    Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms (usually public-key algorithms) that are currently thought to be secure against a cryptanalytic attack by a quantum computer.

  5. International Association for Cryptologic Research - Wikipedia

    en.wikipedia.org/wiki/International_Association...

    "For opening up new areas in cryptography and computer security, for innovative educational initiatives in cryptography, and for service to the IACR." Moti Yung: 2014 "For fundamental and innovative contributions to cryptography and its application to the security and privacy of real world systems." Eyal Kushilevitz: 2014

  6. Carnegie Mellon University Usable Privacy and Security ...

    en.wikipedia.org/wiki/Carnegie_Mellon_University...

    Indeed, one of the four grand research challenges in information security and assurance identified by the Computing Research Association in 2003 is: "Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future." This is the challenge that CUPS strives to address.

  7. List of emerging technologies - Wikipedia

    en.wikipedia.org/wiki/List_of_emerging_technologies

    Emerging technology Status Potential applications Related articles Active structure: Research, development, commercialization Adaptive structures that respond to different conditions, or supermassive buildings and infrastructure (e.g. space fountains)

  8. Encyclopedia of Cryptography and Security - Wikipedia

    en.wikipedia.org/wiki/Encyclopedia_of...

    The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the fields of Computer Science, Applied Mathematics, Engineering, Information Theory, Data Encryption, etc. [1] It consists of 460 articles in alphabetical order and is available electronically and in print.

  9. Index of cryptography articles - Wikipedia

    en.wikipedia.org/wiki/Index_of_cryptography_articles

    Padding (cryptography) • Padding oracle attack • Paillier cryptosystem • Pairing-based cryptography • Panama (cryptography) • Partitioning cryptanalysis • Passive attack • Passphrase • Password • Password-authenticated key agreement • Password cracking • Password Hashing Competition • Paul Kocher • Paulo Pancatuccio ...