Home page » Initial: c » First 2 letters: cr » Keyword: cryptographic

28 Dutch websites relevant to the keyword: cryptographic

DomainExcerpts relevant to keyword: cryptographicRelated expressionsOther expressions from the websiteeRelevance
michaelwaterman.nlIn the realm of Public Key Infrastructure (PKI), where the keys to digital security are exchanged, stored, and safeguarded, cryptographic providers play a pivotal role. These providers are the guardians of cryptographic keys, ensuring the…pki cryptographic, cryptographic providers, store cryptographic, cryptographic provider, guardian cryptographicpki, directory, length, algorithm, connect7
marc-stevens.nlNon-interactive Cryptographic Timestamping based on Verifiable Delay Functions , Esteban Landerreche, Christian Schaffner, Marc Stevens, Financial Crypto, 2020. (PDF) .lock cryptographic, cryptographic assumption, good cryptographic, cryptographic attack, interactive cryptographiccollision, attack, lecture, pp, note6
sbd-research.nlThe Security By Design (SBD) group researches hardware and cryptographic security.hardware cryptographic, cryptographic securitypublication, imaging, vacancy, computing, embed4
nickys-beauty-and-nails.nlAmong the key features of Bitcoin casino sites is the use of provably reasonable modern technology. This cryptographic method allows gamers to validate the fairness of each video game’s outcome, ensuring that neither the casino site nor…technology cryptographic, cryptographic method, use cryptographic, cryptographic algorithmgambling, enterprise, establishment, player, bride2
thomwiggers.nlPh.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes use of trade-offs presented by post-quantum cryptographic…quantum cryptographic, cryptographic primitivequantum, cryptography, publication, thesis, phd2
sjoerdlangkemper.nlPasswords are typically not stored plaintext in a database. Instead, a cryptographic hash is stored. This makes it possible to check the password, but makes it hard to get the plaintext password, even if the database is leaked. The way…instead cryptographic, cryptographic hash, binding cryptographic, cryptographic tokenheader, attack, request, vulnerability, csrf2
matth-ijs.nlMy yearly tradition is to create a bunch of cryptographic puzzles for Easter. And this year is no exception. Play the puzzle now! Some tips 🔗 The puzzles are very difficult, so it may take you a long time for each puzzle. That’s by…series cryptographic, cryptographic puzzle, bunch cryptographicpuzzle, easter, yearly, transition, archive2
pqc-spring-school.nl…topic going over all areas of post-quantum cryptography. In addition, the school gives a quick crash course on cryptographic basics to also enable students from outside cryptography to follow the school. The lectures should be accessiblepqc cryptographic, cryptographic algorithm, course cryptographic, cryptographic basicquantum, cryptography, venue, registration, fellow2
joostrijneveld.nlWrite-up of my solution to Hex-Rays CTF "Madame De Maintenon’s Cryptographic Pursuit – Unmasking the Traitors."maintenon cryptographic, cryptographic pursuit, ta cryptographic, cryptographic engineeringwrite, signature, quantum, implementation, schwabe2
jelmervanderlinde.nlbut also of techniques to safeguard against misuse, e.g. differential privacy. Second, through the safety of the code that powers it. I know how to prevent SQL-injection, XSS-attacks and am familiar with common cryptographic good practices.common cryptographic, cryptographic goodcover, processing, association, study, administration1
bigcircle.nl…and a player who tries to append a block that doesn’t fit the end of the chain will have to skip turn for cheating. In the case of blockchain a block does not include dots, but instead a list of recent transactions of cryptographic assets.transaction cryptographic, cryptographic assetreflection, official, ux, truth, psychology1
ondergetekende.nlAs usual with cryptographic tools, you need to be weary of tools made by malicious or incompetent actors. Obviously I claim not to be a malicious actor, and as the code is just a few lines long, it shouldn’t be hard to verify my code…usual cryptographic, cryptographic toolpython, prime, entire, representation, coverage1
jvdham.nl…for network capture anonymisation. There have been many advances in the understanding of anonymisation and cryptographic methods, which have changed the perspective on the effectiveness of many anonymisation techniques. However…anonymisation cryptographic, cryptographic methodethics, vulnerability, cite, associate, position1
friendsoflittleyus.nlThe Solar Desktop Wallet makes your cryptographic keys available for message signing. Signing a message is useful in a situation where you need to prove you are in control of a…wallet cryptographic, cryptographic keystat, mqtt, delegate, validator, proposal1
jelle-vos.nlI finished my internship at Apple, designing a post-quantum alternative for a popular cryptographic protocol.popular cryptographic, cryptographic protocolthreat, publication, intelligence, repository, sensitive1
laurensverspeek.nlThe first Blockchain-based framework for the Future-of-Work. Access a global, on-demand, 24x7 scalable WorkForce. EFX is the cryptographic token that fuels the Effect Networkefx cryptographic, cryptographic tokenpaper, thesis, background, stack, slice1
linksight.nlIt is our mission to help organizations extract maximum insights and value from their data collaborations, without revealing sensitive data. Share the insight, not the data. To do that, we make complex cryptographic technology easy and…complex cryptographic, cryptographic technologysensitive, collaboration, analysis, multiple, secure1
blackcoin.nlEach block contains a cryptographic hash of the previous block, a timestamp, and transaction data represented as a Merkle tree.block cryptographic, cryptographic hashmin, publish, dust, transaction, command1
fuse5g.nlThe Horizon Europe project CONFIDENTIAL6G develops (post-quantum) cryptographic solutions to enhance the privacy and confidentiality guarantees in 6G communication infrastructures. The project analyzes the quantum vulnerabilities of 5G…quantum cryptographic, cryptographic solutionfuse, talk, quantum, slide, committee1
dcent.nlWe are at the heart of the decentralized web. We mainly participate by storing vast amounts of data for clients, and using cryptographic proofs to proof that storage over time.client cryptographic, cryptographic proofstorage, decentralized, gpu, sustainability, edge1
trendforum.nlGoogle’s Certificate Transparency project fixes several structural flaws in the SSL certificate system, which is the main cryptographic system that underlies all HTTPS connections. Certificate Tra...main cryptographic, cryptographic systemeconomic, society, woman, interesting, christianity1
stickybit.nlThankfully there is the Web Cryptographic API , which make payload encryption beteen front- and back-end possible, natively in the browser. Now we can even pass encrypted database records directly to the Web-Application without the need…web cryptographic, cryptographic apiapi, native, stuff, bit, encryption1
cci-research.nl…a solid foundation for advanced data analytics and artificial intelligence applications. We teach the next generation of computer science professionals, and cooperate with a large ecosystem of organizations. Our focus areas include…cryptographic engineeringphd, teach, infrastructure, candidate, informatics0
vhia.nlHome… Portfolio… Mainframe audits… Health Insurance (OHI)… DigiD and Suwinet…insurance0
eccentric-authentication.nl…want to log in. But users cannot tell the bank from a criminal site posing as the bank. Eccentric Authentication does not use passwords at all. The protocol never divulges any secrets that could allow someone else to impersonate the user.authentication, identity, secure, anonymous, connection0
devopsinternational.nlBy developing a prototype, we create a first working model of the product idea. The prototype will have most of the functionalities of the end product so that it can serve as a sample for the users to test and evaluate the idea…cryptographic protocolsociety, craftsmanship, decentralized, potential, investor0
optisec.nl…for both experienced and inexperienced people and opens the door to any specialization. Both penetration testers and security managers benefit greatly from CISSP, as it provides insights into the entire field of information security.pki cryptographic, cryptographic applicationcertified, cissp, official, domain, topic0
wardvissers.nlCategories Active Directory , Microsoft , Server 2012 R2 , Server 2016 , Server 2019 , Server 2022 Tags 2 , 2012 , 2012 R2 , Active Directory , App , Cloud , Common , Deploy , Issue , Microsoft , Security , Server , Server 2012 , Server…support cryptographic, cryptographic agilityvmware, vsphere, esxi, host, exchange0