Cryptographic hash function | Cryptographic nonce | cryptographic hash function | Controlled Cryptographic Item |
The utility circumvents content protection by decrypting video files directly with AES, the underling cryptographic cipher used by AACS.
Wooding was one of seven people in the world entrusted by the Internet Corporation for Assigned Names & Numbers (ICANN) with a special cryptographic ‘smart-card’ that holds part of a key used to generate the Domain Name Server Security Extensions (DNSSEC) protocol that protects Internet domain names.
Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network.
The Cryptographic Quarterly is an internal, classified journal of the U.S. National Security Agency (NSA).
David Lee Chaum (born 1955) is the inventor of many cryptographic protocols, as well as ecash and DigiCash.
Distinguishing attack, a cryptographic attack that distinguishes a ciphertext from truly random data
The general cryptographic community was initially not aware of the potential backdoor, until of Dan Shumow and Niels Ferguson 2007 rediscovery, or of Certicom's Daniel R. L. Brown and Scott Vanstone's 2005 patent application describing the backdoor mechanism.
EAX mode, a mode of operation for cryptographic block ciphers
On May 30, 2007, Certicom filed a lawsuit against Sony in United States District Court for the Eastern District of Texas Marshall office, claiming that Sony's use of ECC in Advanced Access Content System and Digital Transmission Content Protection violates Certicom's patents for that cryptographic method.
Edward M. Scheidt (born 1939) is a retired Chairman of the Central Intelligence Agency (CIA) Cryptographic Center and the designer of the cryptographic systems used in the Kryptos sculpture at CIA Headquarters in Langley, Virginia.
The use of a PIN and cryptographic algorithms such as DES, Triple-DES, RSA and SHA provide authentication of the card to the processing terminal and the card issuer's host system.
The ThreeBallot voting protocol, invented by Ron Rivest, was designed to provide some of the benefits of a cryptographic voting system without using cryptography.
Fowler–Noll–Vo hash function, a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Phong Vo
Antoine Rossignol's cryptographic skills became known when in 1626 an encrypted letter was taken from a messenger leaving the city of Réalmont, controlled by the Huguenots and surrounded by the French army.
A British boarding party, consisting of Lieutenant Francis Anthony Blair Fasson, Able Seaman Colin Grazier, and Canteen Assistant Tommy Brown, from destroyer HMS Petard recovered the cryptographic materials, but the U-boat sank before the Enigma cipher machine could be brought out.
Time-stamp services produce time-stamp tokens, which are data structures containing a verifiable cryptographic binding between a data item's representation and a time-value.
The Jenkins hash functions are a collection of (non-cryptographic) hash functions for multi-byte keys designed by Bob Jenkins.
Whitfield Diffie - Developed the world's earliest public key cryptographic system along with Merkle and Hellman
In white-box cryptography, obfuscation refers to the protection of cryptographic keys from extraction when they are under the control of the adversary, e.g., as part of a DRM scheme.
Standard cryptographic hashes, such as the Secure Hash Algorithm series, are very hard to reverse, so an attacker who gets hold of the hash value cannot directly recover the password.
Its central features were the use of the Host Identity Protocol (HIP), cryptographic identities, secure directories, and location to make policy-based information about users and the network available to applications, management systems, and intelligent network components.
ZRTP, a cryptographic key-agreement protocol using Secure Real-time Transport Protocol for encryption
Data transfers between TeamDrive's servers and version ≥3.0 of their client program uses 3072-bit RSA key pairs generated by the OpenSSL cryptographic library.
Eric Nave's Navy cryptographic unit was at Victoria Barracks until it moved to FRUMEL.
The system also included a cryptographic element called the Fiat Shamir Zero Knowledge Test.
Since that time he has also been working as a cryptographic consultant to Safenet, formally Aladdin.