Home page » Initial: c » First 2 letters: cr » Keyword: cryptography

59 Dutch websites relevant to the keyword: cryptography

DomainExcerpts relevant to keyword: cryptographyRelated expressionsOther expressions from the websiteeRelevance
relindejurrius.nlSeptember 21, 2021. - q-Analogues in codes and related combinatorics. Cryptography and Coding Theory: First Annual Conference. Online. Invited speaker. slides websitecombinatorics cryptography, cryptography code, practice cryptography, cryptography security, theory cryptographymathematics, geometry, conference, theory, finite13
thomwiggers.nlPh.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes use of trade-offs presented by post-quantum cryptographic…senior cryptography, cryptography researcher, wiggers cryptography, quantum cryptography, cryptography protocolquantum, publication, thesis, phd, candidate10
cryptris.nlDiscover the universe of cryptography: play against the computer to find out who will be able to decrypt the fastest. Many challenges await you, are you ready?asymetric cryptography, cryptography game, universe cryptography, cryptography computeruniverse, documentation10
pqc-spring-school.nlThis 5-day-long scientific school introduces students to the topic of post-quantum cryptography. International experts in the area of post-quantum cryptography cover the different, most relevant aspects of the topic going over all areas…investment cryptography, cryptography arrival, quantum cryptography, cryptography pqc, cryptography internationalquantum, venue, registration, fellow, accommodation9
marc-stevens.nlEfficient doubling on genus two curves over binary fields , Tanja Lange and Marc Stevens, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 3357, Springer, 2004, pp. 170-181, (PDF) .quantum cryptography, cryptography april, conference cryptography, cryptography network, symmetric cryptographycollision, attack, lecture, pp, note7
joostrijneveld.nlFrom 2015 to 2019, Joost Rijneveld was a PhD candidate at Radboud University, Nijmegen, working on software implementations of post-quantum cryptography (as part of the PQCRYPTO project).quantum cryptography, cryptography pqcryptowrite, signature, quantum, implementation, schwabe5
nldigitalgovernment.nlRecently, the European Commission made a recommendation to transition to Post-Quantum Cryptography. It aims to eliminate the vulnerabilities of current asymmetric cryptography.quantum cryptography, cryptography vulnerabilitygovernment, caribbean, digitalisation, topic, protection5
joelhaasnoot.nlIn the mean time, the whole Snowden - NSA news had blown up, uncovering the extent to which the NSA performs internet surveillance. Reading this book about cryptography also paints a picture that makes it easy to match the two stories -…text cryptography, cryptography secrecy, complete cryptography, cryptography sphere, book cryptographyrandom, programmer, note, screen, present5
numbersoddities.nlNumbers stations and other odd radio stations, espionage, jamming, cryptography, code messages, SIGINTjam cryptography, cryptography codeodd, russian, file, recording, german4
kevinhill.nlThis blog represents my personal opinions and not those of my employer. I rant about phones, cryptography, IoT stuff or physics.engineer cryptography, cryptography nerd, phone cryptography, cryptography iothill, stuff, physics, opinion2
cypherpunk.nlInternational Conference on Applied Cryptography and Network Security (ACNS 2017), Lecture Notes in Computer Science, Springer, 2017, Volume 10355, p. 557-578apply cryptography, cryptography network, financial cryptography, cryptography dataconference, note, lecture, proceedings, association2
dezwart-ict.nlConfiguration Manager has limited support for Cryptography: Next Generation (CNG) certificates. Configuration Manager clients can use PKI client authentication certificate with private key in CNG Key Storage Provider (KSP). With KSP…support cryptography, cryptography generationdevice, configuration, release, profile, guard2
cci-research.nlTraditionally, cryptography is used to protect data in transit from an eavesdropping adversary. With the advent of big data and large-scale computation, cryptography can offer us much more. The course focuses on Secure Computation that…traditionally cryptography, cryptography datum, computation cryptography, cryptography course, tool cryptographyphd, teach, infrastructure, candidate, informatics2
acropol.nlWe specialise in Security Strategy & Policy . Secure Design . Authentication . Digital Identities . Secure Automation . Cryptography . Security Operations . Risk assessmentautomation cryptography, cryptography securityevaluation, growth, secure, authentication, risk2
joostrenes.nlI am a Principal Cryptographer at NXP Semiconductors based in Eindhoven, the Netherlands. I work towards enabling post-quantum cryptography (PQC) for various applications, mostly in the embedded domain. This involves taking on the many…quantum cryptography, cryptography pqc, curve cryptography, cryptography summer, security cryptographynxp, talk, publication, semiconductor, domain2
cwi.nlCWI conducts pioneering research in mathematics and computer science and transfers new knowledge to society and business. We focus on four areas of fundamental research: Algorithms, Data & Intelligent systems, Cryptography & Security, and…system cryptography, cryptography securitycwi, collaboration, scientific, society, computing2
eccentric-authentication.nlThe end user does not have to think about cryptography or arcane rules, it just works. A user agent hides all that difficult crypto-stuff and behaves in the user’s interest.user cryptography, cryptography arcaneauthentication, identity, secure, anonymous, connection1
uniq-id.nl"By integrating UniqueBits identifiers into our enterprise bitwise inversion technology we were able to get a uniqueness of up to up to 200%!" -- Elisa Nguyen, Head of cryptography department at Blackbox LLC.head cryptography, cryptography departmentpricing, identifiers, pre, executive, uniqueness1
ondergetekende.nlAs usual, the code is on github . The tool is capable of generating keys in OpenSSH and PEM format. The code depends on cryptography . Also, the code will run faster if you install gmpy2 . Without it, generating a 4096 bit key takes 10…code cryptography, cryptography code, true cryptography, cryptography expert, aware cryptographypython, prime, entire, representation, coverage1
connectmedia.nl…encryption protocols that secure the communication on the internet. Communication between both parties is also encrypted by making use of the symmetric cryptography in the form of a block cipher, so that malicious parties cannot track it.symmetric cryptography, cryptography formconnect, payment, transaction, german, french1
jelle-vos.nlMy research focuses on secure multi-party computation protocols using homomorphic encryption . I am specifically interested in lattice-based cryptography . I aim to apply these techniques to cyber threat intelligence , where classical…lattice cryptography, cryptography techniquethreat, publication, intelligence, repository, sensitive1
erinvanderveen.nlAssisting in Bachelor Courses, in particular: Functional Programming, Introduction Cryptographythesis, interest, haskell, sweden, programming1
cryptoechtbegrijpen.nlThis was a great course that gave me introduction to diverse topics ranging from Cryptography, Consensus in distributed systems, blockchains and bitcoin of course. Anyone who wants to have a great understanding of foundations of bitcoin…topic cryptography, cryptography consensusnecessity, money, warranty, complaint, early1
greenone.nlParrot (formerly Parrot Security OS) is a Debian-based, security-oriented distribution featuring a collection of utilities designed for penetration testing, computer forensics, reverse engineering, hacking, privacy, anonymity and…distribution, operate, debian, enim, labore1
1gbit.nlUse of the Telnet-only binary (PuTTYtel) is unrestricted by any cryptography laws.unrestricted cryptography, cryptography lawputty, bit, ssh, snapshot, release1
nn8.nlNew publication: UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography [ 2013-11-08 ]publication, channel, mqtt, covert, implementation1
guusw.nlFor the networking side, I wrote a basic encryption layer for network traffic that uses AES encryption and RSA for exchanging keys. I wrote this system from scratch in order to learn more public key cryptography and symmetric key…key cryptography, cryptography symmetricvisual, duration, description, engine, stack1
mrtijn.nlMy (computer-related) interests include information security, cryptography, embedded systems, free software and Linux server administration.security cryptography, cryptography systemwebpage, humble, interest, administration, capital1
mikamolenkamp.nlPersonal interests include video games (obviously), LAN parties, cryptography and cybersecurity, server administration, pizza, D&D, and learning about hardware.party cryptography, cryptography cybersecurityprogrammer, engine, programming, interest, prog1
rb9.nlI have a background in computer science and cybersecurity with a wide interest in a number of their subfields. Usually, I’m up to discuss programming, software architecture, embedded systems, cryptography and everything else in between!device, bug, hacking, limited, binary1
jinbijin.nlMultiplication by n on elliptic curves over rings (Rennes, cryptography seminar)rennes cryptography, cryptography seminaralgebra, talk, fall, package, study1
cryptohub.nl"The cryptohub is an research lab which is dedicated to bringing innovative projects to life. We are especially interested in privacy, cryptography, anonymity, and computer security."privacy cryptography, cryptography anonymitymirror, binary, zine, observatory, blob1
surferboypizza.nlZeronet is an alternative to the existing web, where websites are hosted by a network of participating computers instead of a centralised server, protected by the same cryptography that’s used for Bitcoin.server cryptography, cryptography bitcoindomain, subdomain, ip, boy, registration1
qutech.nlQuTech and Eurofiber run quantum cryptography on existing fiber in an open testbedquantum cryptography, cryptography fiberquantum, qutech, lab, computing, institute1
greencheck.nlOf course the director of the polluting company can also have a signal with a lot of noise. To stay with the analogy, and moving into the realm of cryptography, the signal can not only be degraded by noise (which you first have to know is…realm cryptography, cryptography signalfebruary, money, october, august, july1
novaris.nlNOVARIS Innovative Technologies has always been an early adopter of innovative technologies such as the Internet of Things, wireless sensor networks, miniaturization, cryptography and indoor positioning systems.miniaturization cryptography, cryptography indoorinnovative, positioning, wireless, analysis, growth1
leongb.nlI am a fresh PhD in cryptography from Eindhoven University of Technology, having successfully defended my thesis entitled “Attacking Post-Quantum Cryptography” on December 17, 2019. On this webpage, you can find my personal info…phd cryptography, cryptography eindhoven, quantum cryptography, cryptography decemberpublication, talk, teach, webpage, quantum1
wouterlueks.nlI am a faculty member at CISPA Helmholtz Center for Information Security in Saarbrucken, Germany. I am interested in building secure, practical, and privacy-friendly systems using applied cryptography, anonymous communication, and…system cryptography, cryptography anonymousposition, faculty, publication, talk, interested1
trafficshare.nl…encryption protocols that secure the communication on the internet. Communication between both parties is also encrypted by making use of the symmetric cryptography in the form of a block cipher, so that malicious parties can not track it.symmetric cryptography, cryptography formprocessing, transaction, payment, innovative, automatically1
sjaaklaan.nlThe 4th edition of my book on Infrastructure Architecture called "Infrastructure Architecture - Infrastructure Building Blocks and Concepts" is published.infrastructure, architecture, quantum, computing, chapter0
a12consultants.nlHardware Security Analyst Do you like analysing complex security issues? This security lab is an ambitious organization specializing in embedded security testing for leading...vacancy, payment, ambitious, analyst, reliability0
jbeekman.nlSide-channel attacks are my favorite attack in computer security because they poke giant holes in the abstraction and security models that system designers are using. … View »security cryptography, cryptography networkingattack, utility, networking, intel, channel0
rssf.nlThe Netherlands-based Stichting Route Server Support (translated: Route Server Support Foundation) was founded to support the development of BGP & RPKI route server software to further the quality and safety of the Internet routing system.cryptography developermin, implementation, found, diversity, oct0
verifymyage.nlVerifying your age can be time consuming and inconvenient. With VerifyMyAge your customers can re-authenticate themselves using their VerifyMyAge account across all websites and services using VerifyMyAge.verification, seamless, adult, assurance, seller0
simonplantinga.nl…Pythagorean tuning (yes, my digital piano can play Pythagorean). I haven’t checked in which keys the Divine 9 example are, but I doubt it sounds that good in all 12 keys (which is exactly why we use equal temperament on a piano). Read Moreprogramming, divine, chord, hacking, mathematics0
rodrigoalbornoz.nlVisual Artist - Media Artist- Art ResearchArtista Visual y de Medios. Investigador.rodrigo, visual, artistic, washing, pattern0
wietzebeukema.nlFor defenders, this project can provide valuable information when trying to detect DLL Hijacking attempts. Although detecting DLL Hijacking isn't always without challenge, it is certainly possible to monitor for behaviour that may be…strong cryptography, cryptography centuryjuly, dll, paper, august, january0
quantumsc.nl…as a full-blown quantum computer and large-scale quantum internet will have unprecedented computational and communication abilities. In order to achieve this move forward, forces must be combined. Therefore QSC is building a new…iii cryptography, cryptography quantumquantum, committee, outreach, backbone, traffic0
ferbi.nlExplore Relexicon's diverse range of 100+ AI professionals ready to enhance your personal and professional life. Discover tailored AI solutions in cybersecurity, digital marketing, software development, and more. Meet your AI assistant…cryptography specialistpsychologist, analyst, teacher, reynolds, bennett0
gouwart.nlReady to start your next design project with me? That's great! Give me a call or send me an email and I will get back to you as soon as possible!painting, discover, installation, scenery, creativity0
sjoerdlangkemper.nlPasswords are typically not stored plaintext in a database. Instead, a cryptographic hash is stored. This makes it possible to check the password, but makes it hard to get the plaintext password, even if the database is leaked. The way…header, attack, request, vulnerability, csrf0
c5n.nlCodicon is an IT company that is specialized in, among other things, software, hardware, cyber security, consultancy and more.section, react, computing, developement, pricing0
droidcon.nlAli Parr is currently heading up Mobile Platform Partnerships Engineering for Facebook in EMEA. Ali is focused on (more)implement cryptography, cryptography androidtalk, parr, venue, tonight, emea0
gijsvandam.nl…channels along a possible route, the proposed route can fail for lack of liquidity. So the sender is forced to try routes until it stumbles upon one that has enough liquidity to relay the payment; it's a process of trial and error. To…payment, signature, git, balance, paper0
xdna.nlContact… Lees…advance cryptographyartificial, intelligence, disruptive, response, detection0
zerosumsecurity.nlHome… Training… Support… Slide…slide, deck, interactive, untitled0
optisec.nl…for both experienced and inexperienced people and opens the door to any specialization. Both penetration testers and security managers benefit greatly from CISSP, as it provides insights into the entire field of information security.certified, cissp, official, domain, topic0
fuse5g.nlunauthorised access have become paramount. Establishing a dedicated forum where professionals from across industry, academia and government can come together to discuss the current state of mobile network security is critical to addressing…fuse, talk, quantum, slide, committee0
ceesjansen.nl…News… Announcements… Contact… Dutch… English… Scroll down to content… Privacyastrology, metaphysics, announcement, triangle, wire0