University of Virginia
CS 588 — Cryptology - Principles and Applications
33 documents • ranked by quality and engagement.
No description provided
Two Fish vs Rijndael
Authentication Techniques
Timing Attacks on ECC
Malicious Code (Lecture 20)
Digital Watermarking Feasibility for Music Copyright
Public Key Infrastructure (Lecture 14)
Non-Secret Key Cryptosystems (Lecture 12)
Complexity-Based Security
Intrusion Detection and Firewalls
Elliptic Curve Cryptography Timing Attacks
Real World PKI Implementation
Rijndael and Twofish Analysis
Secure National ID Cards
Healthcare System at UVa
Security of RSA Encryption
Ciphers Perfect Secrecy
Cryptosystems with Non-Secret Keys
Blocking and Catching Photons (Lecture 16)
Eternity Service Overview
Rijndael vs Two Fish
Confusion Striving For
Security Protocols for Sensor Networks (SPINS)
Sensor Network Security
Protocols using Public Keys