michaelwaterman.nl | In the realm of Public Key Infrastructure (PKI), where the keys to digital security are exchanged, stored, and safeguarded, cryptographic providers play a pivotal role. These providers are the guardians of cryptographic keys, ensuring the… | pki cryptographic, cryptographic providers, store cryptographic, cryptographic provider, guardian cryptographic | pki, directory, length, algorithm, connect | 7 |
marc-stevens.nl | Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions , Esteban Landerreche, Christian Schaffner, Marc Stevens, Financial Crypto, 2020. (PDF) . | lock cryptographic, cryptographic assumption, good cryptographic, cryptographic attack, interactive cryptographic | collision, attack, lecture, pp, note | 6 |
sbd-research.nl | The Security By Design (SBD) group researches hardware and cryptographic security. | hardware cryptographic, cryptographic security | publication, imaging, vacancy, computing, embed | 4 |
nickys-beauty-and-nails.nl | Among the key features of Bitcoin casino sites is the use of provably reasonable modern technology. This cryptographic method allows gamers to validate the fairness of each video game’s outcome, ensuring that neither the casino site nor… | technology cryptographic, cryptographic method, use cryptographic, cryptographic algorithm | gambling, enterprise, establishment, player, bride | 2 |
thomwiggers.nl | Ph.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes use of trade-offs presented by post-quantum cryptographic… | quantum cryptographic, cryptographic primitive | quantum, cryptography, publication, thesis, phd | 2 |
sjoerdlangkemper.nl | Passwords are typically not stored plaintext in a database. Instead, a cryptographic hash is stored. This makes it possible to check the password, but makes it hard to get the plaintext password, even if the database is leaked. The way… | instead cryptographic, cryptographic hash, binding cryptographic, cryptographic token | header, attack, request, vulnerability, csrf | 2 |
matth-ijs.nl | My yearly tradition is to create a bunch of cryptographic puzzles for Easter. And this year is no exception. Play the puzzle now! Some tips 🔗 The puzzles are very difficult, so it may take you a long time for each puzzle. That’s by… | series cryptographic, cryptographic puzzle, bunch cryptographic | puzzle, easter, yearly, transition, archive | 2 |
pqc-spring-school.nl | …topic going over all areas of post-quantum cryptography. In addition, the school gives a quick crash course on cryptographic basics to also enable students from outside cryptography to follow the school. The lectures should be accessible | pqc cryptographic, cryptographic algorithm, course cryptographic, cryptographic basic | quantum, cryptography, venue, registration, fellow | 2 |
joostrijneveld.nl | Write-up of my solution to Hex-Rays CTF "Madame De Maintenon’s Cryptographic Pursuit – Unmasking the Traitors." | maintenon cryptographic, cryptographic pursuit, ta cryptographic, cryptographic engineering | write, signature, quantum, implementation, schwabe | 2 |
jelmervanderlinde.nl | but also of techniques to safeguard against misuse, e.g. differential privacy. Second, through the safety of the code that powers it. I know how to prevent SQL-injection, XSS-attacks and am familiar with common cryptographic good practices. | common cryptographic, cryptographic good | cover, processing, association, study, administration | 1 |
bigcircle.nl | …and a player who tries to append a block that doesn’t fit the end of the chain will have to skip turn for cheating. In the case of blockchain a block does not include dots, but instead a list of recent transactions of cryptographic assets. | transaction cryptographic, cryptographic asset | reflection, official, ux, truth, psychology | 1 |
ondergetekende.nl | As usual with cryptographic tools, you need to be weary of tools made by malicious or incompetent actors. Obviously I claim not to be a malicious actor, and as the code is just a few lines long, it shouldn’t be hard to verify my code… | usual cryptographic, cryptographic tool | python, prime, entire, representation, coverage | 1 |
jvdham.nl | …for network capture anonymisation. There have been many advances in the understanding of anonymisation and cryptographic methods, which have changed the perspective on the effectiveness of many anonymisation techniques. However… | anonymisation cryptographic, cryptographic method | ethics, vulnerability, cite, associate, position | 1 |
friendsoflittleyus.nl | The Solar Desktop Wallet makes your cryptographic keys available for message signing. Signing a message is useful in a situation where you need to prove you are in control of a… | wallet cryptographic, cryptographic key | stat, mqtt, delegate, validator, proposal | 1 |
jelle-vos.nl | I finished my internship at Apple, designing a post-quantum alternative for a popular cryptographic protocol. | popular cryptographic, cryptographic protocol | threat, publication, intelligence, repository, sensitive | 1 |
laurensverspeek.nl | The first Blockchain-based framework for the Future-of-Work. Access a global, on-demand, 24x7 scalable WorkForce. EFX is the cryptographic token that fuels the Effect Network | efx cryptographic, cryptographic token | paper, thesis, background, stack, slice | 1 |
linksight.nl | It is our mission to help organizations extract maximum insights and value from their data collaborations, without revealing sensitive data. Share the insight, not the data. To do that, we make complex cryptographic technology easy and… | complex cryptographic, cryptographic technology | sensitive, collaboration, analysis, multiple, secure | 1 |
blackcoin.nl | Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data represented as a Merkle tree. | block cryptographic, cryptographic hash | min, publish, dust, transaction, command | 1 |
fuse5g.nl | The Horizon Europe project CONFIDENTIAL6G develops (post-quantum) cryptographic solutions to enhance the privacy and confidentiality guarantees in 6G communication infrastructures. The project analyzes the quantum vulnerabilities of 5G… | quantum cryptographic, cryptographic solution | fuse, talk, quantum, slide, committee | 1 |
dcent.nl | We are at the heart of the decentralized web. We mainly participate by storing vast amounts of data for clients, and using cryptographic proofs to proof that storage over time. | client cryptographic, cryptographic proof | storage, decentralized, gpu, sustainability, edge | 1 |
trendforum.nl | Google’s Certificate Transparency project fixes several structural flaws in the SSL certificate system, which is the main cryptographic system that underlies all HTTPS connections. Certificate Tra... | main cryptographic, cryptographic system | economic, society, woman, interesting, christianity | 1 |
stickybit.nl | Thankfully there is the Web Cryptographic API , which make payload encryption beteen front- and back-end possible, natively in the browser. Now we can even pass encrypted database records directly to the Web-Application without the need… | web cryptographic, cryptographic api | api, native, stuff, bit, encryption | 1 |
cci-research.nl | …a solid foundation for advanced data analytics and artificial intelligence applications. We teach the next generation of computer science professionals, and cooperate with a large ecosystem of organizations. Our focus areas include… | cryptographic engineering | phd, teach, infrastructure, candidate, informatics | 0 |
vhia.nl | Home… Portfolio… Mainframe audits… Health Insurance (OHI)… DigiD and Suwinet… | | insurance | 0 |
eccentric-authentication.nl | …want to log in. But users cannot tell the bank from a criminal site posing as the bank. Eccentric Authentication does not use passwords at all. The protocol never divulges any secrets that could allow someone else to impersonate the user. | | authentication, identity, secure, anonymous, connection | 0 |
devopsinternational.nl | By developing a prototype, we create a first working model of the product idea. The prototype will have most of the functionalities of the end product so that it can serve as a sample for the users to test and evaluate the idea… | cryptographic protocol | society, craftsmanship, decentralized, potential, investor | 0 |
optisec.nl | …for both experienced and inexperienced people and opens the door to any specialization. Both penetration testers and security managers benefit greatly from CISSP, as it provides insights into the entire field of information security. | pki cryptographic, cryptographic application | certified, cissp, official, domain, topic | 0 |
wardvissers.nl | Categories Active Directory , Microsoft , Server 2012 R2 , Server 2016 , Server 2019 , Server 2022 Tags 2 , 2012 , 2012 R2 , Active Directory , App , Cloud , Common , Deploy , Issue , Microsoft , Security , Server , Server 2012 , Server… | support cryptographic, cryptographic agility | vmware, vsphere, esxi, host, exchange | 0 |