#protocol_design search results
Security concern with TOTP - Visit programmatic.solutions/aivl74/securit… for the solution. #protocol_design #protocol_analysis #one_time_password #hotp #two_factor_authentication
Non-deniability of data sent over TLS - Visit programmatic.solutions/r37iyk/non-den… for the solution. #protocol_design #tls #deniable_encryption #non_repudiation #cryptography
Zero knowledge proof of shared secret - Visit programmatic.solutions/o2cbmd/zero-kn… for the solution. #protocol_design #zero_knowledge_proofs #cryptography #coder #development
Design for file transfers to a new party - Visit programmatic.solutions/lputx0/design-… for the solution. #protocol_design #key_exchange #file_encryption #cryptography #engineering
Does anyone still use BAN or GNY logic in practice? - Visit programmatic.solutions/at923k/does-an… for the answer. #protocol_design #provable_security #cryptography #coder #engineer
Why is plain-hash-then-encrypt not a secure MAC? - Visit programmatic.solutions/74pr73/why-is-… for the answer. #hash #protocol_design #mac #cryptography #softwareengineering
Encrypt-then-authenticate variant used in IPsec - Visit programmatic.solutions/rl9gcd/encrypt… for the solution. #encryption #protocol_design #authentication #mac #authenticated_encryption
Rationale of "r" AES key use in OTR version 3 AKE protocol? - Visit programmatic.solutions/cnt90c/rationa… for the answer. #protocol_design #diffie_hellman #key_exchange #perfect_secrecy #cryptography
How do TLS 1.1 and 1.2 generate IVs (initialization vectors) for each record? - Visit programmatic.solutions/9v6q89/how-do-… for the answer. #protocol_design #implementation #tls #protocol_analysis #cryptography
Secure function evaluation - Visit programmatic.solutions/0snu46/secure-… for the solution. #protocol_design #secret_sharing #multiparty_computation #cryptography #engineering
Why must we generate the signature before any compression being done at PGP? - Visit programmatic.solutions/x8klkr/why-mus… for the answer. #protocol_design #authenticated_encryption #pgp #cryptography #100daysofcode
What is a simple information authentication protocol for constrained devices? - Visit programmatic.solutions/xt7etg/what-is… for the answer. #protocol_design #authentication #hmac #cryptography #devlife
Collision-resistant Pseudorandom function - Visit programmatic.solutions/8lzhbn/collisi… for the solution. #protocol_design #pseudo_random_generator #pseudo_random_function #multiparty_computation #cryptography
Why is plain-hash-then-encrypt not a secure MAC? - Visit programmatic.solutions/74pr73/why-is-… for the answer. #hash #protocol_design #mac #cryptography #softwareengineering
What's wrong with my security model - or how can it be attacked? - Visit programmatic.solutions/d54oj3/whats-w… for the answer. #aes #protocol_design #pbkdf_2 #bcrypt #protocol_analysis
What is the advantage of using the socialist millionaire protocol to authenticate vs HMACing some random number? - Visit programmatic.solutions/420j1n/what-is… for the answer. #protocol_design #authentication #cryptography #datascience #software
Fairness in Multi party computation - Visit programmatic.solutions/csakb3/fairnes… for the solution. #protocol_design #provable_security #cryptography #computerengineering #computer
Is it feasible to design a crypto scheme for centralised reporting of anonymized data? - Visit programmatic.solutions/1i0lc4/is-it-f… for the answer. #hash #public_key #protocol_design #hmac #cryptography
Something went wrong.
Something went wrong.
United States Trends
- 1. Vikings 22.7K posts
- 2. Steelers 26.6K posts
- 3. Panthers 49.7K posts
- 4. Rodgers 9,280 posts
- 5. Bills 77.4K posts
- 6. Ole Miss 103K posts
- 7. Rams 32.8K posts
- 8. Mason Rudolph 1,360 posts
- 9. Colts 33.8K posts
- 10. Howard 11.5K posts
- 11. Brosmer 7,990 posts
- 12. Justin Jefferson 3,445 posts
- 13. Falcons 13.8K posts
- 14. #HereWeGo 3,267 posts
- 15. Jets 39.2K posts
- 16. #Skol 2,538 posts
- 17. Browns 46.6K posts
- 18. Seahawks 18.8K posts
- 19. Herbert 7,328 posts
- 20. Texans 25.1K posts