relindejurrius.nl | September 21, 2021. - q-Analogues in codes and related combinatorics. Cryptography and Coding Theory: First Annual Conference. Online. Invited speaker. slides website | combinatorics cryptography, cryptography code, practice cryptography, cryptography security, theory cryptography | mathematics, geometry, conference, theory, finite | 13 |
thomwiggers.nl | Ph.D. thesis on post-quantum cryptography in TLS. I investigate current proposals for post-quantum TLS, but more importantly we propose a more efficient TLS handshake that makes use of trade-offs presented by post-quantum cryptographic… | senior cryptography, cryptography researcher, wiggers cryptography, quantum cryptography, cryptography protocol | quantum, publication, thesis, phd, candidate | 10 |
cryptris.nl | Discover the universe of cryptography: play against the computer to find out who will be able to decrypt the fastest. Many challenges await you, are you ready? | asymetric cryptography, cryptography game, universe cryptography, cryptography computer | universe, documentation | 10 |
pqc-spring-school.nl | This 5-day-long scientific school introduces students to the topic of post-quantum cryptography. International experts in the area of post-quantum cryptography cover the different, most relevant aspects of the topic going over all areas… | investment cryptography, cryptography arrival, quantum cryptography, cryptography pqc, cryptography international | quantum, venue, registration, fellow, accommodation | 9 |
marc-stevens.nl | Efficient doubling on genus two curves over binary fields , Tanja Lange and Marc Stevens, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 3357, Springer, 2004, pp. 170-181, (PDF) . | quantum cryptography, cryptography april, conference cryptography, cryptography network, symmetric cryptography | collision, attack, lecture, pp, note | 7 |
joostrijneveld.nl | From 2015 to 2019, Joost Rijneveld was a PhD candidate at Radboud University, Nijmegen, working on software implementations of post-quantum cryptography (as part of the PQCRYPTO project). | quantum cryptography, cryptography pqcrypto | write, signature, quantum, implementation, schwabe | 5 |
nldigitalgovernment.nl | Recently, the European Commission made a recommendation to transition to Post-Quantum Cryptography. It aims to eliminate the vulnerabilities of current asymmetric cryptography. | quantum cryptography, cryptography vulnerability | government, caribbean, digitalisation, topic, protection | 5 |
joelhaasnoot.nl | In the mean time, the whole Snowden - NSA news had blown up, uncovering the extent to which the NSA performs internet surveillance. Reading this book about cryptography also paints a picture that makes it easy to match the two stories -… | text cryptography, cryptography secrecy, complete cryptography, cryptography sphere, book cryptography | random, programmer, note, screen, present | 5 |
numbersoddities.nl | Numbers stations and other odd radio stations, espionage, jamming, cryptography, code messages, SIGINT | jam cryptography, cryptography code | odd, russian, file, recording, german | 4 |
kevinhill.nl | This blog represents my personal opinions and not those of my employer. I rant about phones, cryptography, IoT stuff or physics. | engineer cryptography, cryptography nerd, phone cryptography, cryptography iot | hill, stuff, physics, opinion | 2 |
cypherpunk.nl | International Conference on Applied Cryptography and Network Security (ACNS 2017), Lecture Notes in Computer Science, Springer, 2017, Volume 10355, p. 557-578 | apply cryptography, cryptography network, financial cryptography, cryptography data | conference, note, lecture, proceedings, association | 2 |
dezwart-ict.nl | Configuration Manager has limited support for Cryptography: Next Generation (CNG) certificates. Configuration Manager clients can use PKI client authentication certificate with private key in CNG Key Storage Provider (KSP). With KSP… | support cryptography, cryptography generation | device, configuration, release, profile, guard | 2 |
cci-research.nl | Traditionally, cryptography is used to protect data in transit from an eavesdropping adversary. With the advent of big data and large-scale computation, cryptography can offer us much more. The course focuses on Secure Computation that… | traditionally cryptography, cryptography datum, computation cryptography, cryptography course, tool cryptography | phd, teach, infrastructure, candidate, informatics | 2 |
acropol.nl | We specialise in Security Strategy & Policy . Secure Design . Authentication . Digital Identities . Secure Automation . Cryptography . Security Operations . Risk assessment | automation cryptography, cryptography security | evaluation, growth, secure, authentication, risk | 2 |
joostrenes.nl | I am a Principal Cryptographer at NXP Semiconductors based in Eindhoven, the Netherlands. I work towards enabling post-quantum cryptography (PQC) for various applications, mostly in the embedded domain. This involves taking on the many… | quantum cryptography, cryptography pqc, curve cryptography, cryptography summer, security cryptography | nxp, talk, publication, semiconductor, domain | 2 |
cwi.nl | CWI conducts pioneering research in mathematics and computer science and transfers new knowledge to society and business. We focus on four areas of fundamental research: Algorithms, Data & Intelligent systems, Cryptography & Security, and… | system cryptography, cryptography security | cwi, collaboration, scientific, society, computing | 2 |
eccentric-authentication.nl | The end user does not have to think about cryptography or arcane rules, it just works. A user agent hides all that difficult crypto-stuff and behaves in the user’s interest. | user cryptography, cryptography arcane | authentication, identity, secure, anonymous, connection | 1 |
uniq-id.nl | "By integrating UniqueBits identifiers into our enterprise bitwise inversion technology we were able to get a uniqueness of up to up to 200%!" -- Elisa Nguyen, Head of cryptography department at Blackbox LLC. | head cryptography, cryptography department | pricing, identifiers, pre, executive, uniqueness | 1 |
ondergetekende.nl | As usual, the code is on github . The tool is capable of generating keys in OpenSSH and PEM format. The code depends on cryptography . Also, the code will run faster if you install gmpy2 . Without it, generating a 4096 bit key takes 10… | code cryptography, cryptography code, true cryptography, cryptography expert, aware cryptography | python, prime, entire, representation, coverage | 1 |
connectmedia.nl | …encryption protocols that secure the communication on the internet. Communication between both parties is also encrypted by making use of the symmetric cryptography in the form of a block cipher, so that malicious parties cannot track it. | symmetric cryptography, cryptography form | connect, payment, transaction, german, french | 1 |
jelle-vos.nl | My research focuses on secure multi-party computation protocols using homomorphic encryption . I am specifically interested in lattice-based cryptography . I aim to apply these techniques to cyber threat intelligence , where classical… | lattice cryptography, cryptography technique | threat, publication, intelligence, repository, sensitive | 1 |
erinvanderveen.nl | Assisting in Bachelor Courses, in particular: Functional Programming, Introduction Cryptography | | thesis, interest, haskell, sweden, programming | 1 |
cryptoechtbegrijpen.nl | This was a great course that gave me introduction to diverse topics ranging from Cryptography, Consensus in distributed systems, blockchains and bitcoin of course. Anyone who wants to have a great understanding of foundations of bitcoin… | topic cryptography, cryptography consensus | necessity, money, warranty, complaint, early | 1 |
greenone.nl | Parrot (formerly Parrot Security OS) is a Debian-based, security-oriented distribution featuring a collection of utilities designed for penetration testing, computer forensics, reverse engineering, hacking, privacy, anonymity and… | | distribution, operate, debian, enim, labore | 1 |
1gbit.nl | Use of the Telnet-only binary (PuTTYtel) is unrestricted by any cryptography laws. | unrestricted cryptography, cryptography law | putty, bit, ssh, snapshot, release | 1 |
nn8.nl | New publication: UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography [ 2013-11-08 ] | | publication, channel, mqtt, covert, implementation | 1 |
guusw.nl | For the networking side, I wrote a basic encryption layer for network traffic that uses AES encryption and RSA for exchanging keys. I wrote this system from scratch in order to learn more public key cryptography and symmetric key… | key cryptography, cryptography symmetric | visual, duration, description, engine, stack | 1 |
mrtijn.nl | My (computer-related) interests include information security, cryptography, embedded systems, free software and Linux server administration. | security cryptography, cryptography system | webpage, humble, interest, administration, capital | 1 |
mikamolenkamp.nl | Personal interests include video games (obviously), LAN parties, cryptography and cybersecurity, server administration, pizza, D&D, and learning about hardware. | party cryptography, cryptography cybersecurity | programmer, engine, programming, interest, prog | 1 |
rb9.nl | I have a background in computer science and cybersecurity with a wide interest in a number of their subfields. Usually, I’m up to discuss programming, software architecture, embedded systems, cryptography and everything else in between! | | device, bug, hacking, limited, binary | 1 |
jinbijin.nl | Multiplication by n on elliptic curves over rings (Rennes, cryptography seminar) | rennes cryptography, cryptography seminar | algebra, talk, fall, package, study | 1 |
cryptohub.nl | "The cryptohub is an research lab which is dedicated to bringing innovative projects to life. We are especially interested in privacy, cryptography, anonymity, and computer security." | privacy cryptography, cryptography anonymity | mirror, binary, zine, observatory, blob | 1 |
surferboypizza.nl | Zeronet is an alternative to the existing web, where websites are hosted by a network of participating computers instead of a centralised server, protected by the same cryptography that’s used for Bitcoin. | server cryptography, cryptography bitcoin | domain, subdomain, ip, boy, registration | 1 |
qutech.nl | QuTech and Eurofiber run quantum cryptography on existing fiber in an open testbed | quantum cryptography, cryptography fiber | quantum, qutech, lab, computing, institute | 1 |
greencheck.nl | Of course the director of the polluting company can also have a signal with a lot of noise. To stay with the analogy, and moving into the realm of cryptography, the signal can not only be degraded by noise (which you first have to know is… | realm cryptography, cryptography signal | february, money, october, august, july | 1 |
novaris.nl | NOVARIS Innovative Technologies has always been an early adopter of innovative technologies such as the Internet of Things, wireless sensor networks, miniaturization, cryptography and indoor positioning systems. | miniaturization cryptography, cryptography indoor | innovative, positioning, wireless, analysis, growth | 1 |
leongb.nl | I am a fresh PhD in cryptography from Eindhoven University of Technology, having successfully defended my thesis entitled “Attacking Post-Quantum Cryptography” on December 17, 2019. On this webpage, you can find my personal info… | phd cryptography, cryptography eindhoven, quantum cryptography, cryptography december | publication, talk, teach, webpage, quantum | 1 |
wouterlueks.nl | I am a faculty member at CISPA Helmholtz Center for Information Security in Saarbrucken, Germany. I am interested in building secure, practical, and privacy-friendly systems using applied cryptography, anonymous communication, and… | system cryptography, cryptography anonymous | position, faculty, publication, talk, interested | 1 |
trafficshare.nl | …encryption protocols that secure the communication on the internet. Communication between both parties is also encrypted by making use of the symmetric cryptography in the form of a block cipher, so that malicious parties can not track it. | symmetric cryptography, cryptography form | processing, transaction, payment, innovative, automatically | 1 |
sjaaklaan.nl | The 4th edition of my book on Infrastructure Architecture called "Infrastructure Architecture - Infrastructure Building Blocks and Concepts" is published. | | infrastructure, architecture, quantum, computing, chapter | 0 |
a12consultants.nl | Hardware Security Analyst Do you like analysing complex security issues? This security lab is an ambitious organization specializing in embedded security testing for leading... | | vacancy, payment, ambitious, analyst, reliability | 0 |
jbeekman.nl | Side-channel attacks are my favorite attack in computer security because they poke giant holes in the abstraction and security models that system designers are using. … View » | security cryptography, cryptography networking | attack, utility, networking, intel, channel | 0 |
rssf.nl | The Netherlands-based Stichting Route Server Support (translated: Route Server Support Foundation) was founded to support the development of BGP & RPKI route server software to further the quality and safety of the Internet routing system. | cryptography developer | min, implementation, found, diversity, oct | 0 |
verifymyage.nl | Verifying your age can be time consuming and inconvenient. With VerifyMyAge your customers can re-authenticate themselves using their VerifyMyAge account across all websites and services using VerifyMyAge. | | verification, seamless, adult, assurance, seller | 0 |
simonplantinga.nl | …Pythagorean tuning (yes, my digital piano can play Pythagorean). I haven’t checked in which keys the Divine 9 example are, but I doubt it sounds that good in all 12 keys (which is exactly why we use equal temperament on a piano). Read More | | programming, divine, chord, hacking, mathematics | 0 |
rodrigoalbornoz.nl | Visual Artist - Media Artist- Art ResearchArtista Visual y de Medios. Investigador. | | rodrigo, visual, artistic, washing, pattern | 0 |
wietzebeukema.nl | For defenders, this project can provide valuable information when trying to detect DLL Hijacking attempts. Although detecting DLL Hijacking isn't always without challenge, it is certainly possible to monitor for behaviour that may be… | strong cryptography, cryptography century | july, dll, paper, august, january | 0 |
quantumsc.nl | …as a full-blown quantum computer and large-scale quantum internet will have unprecedented computational and communication abilities. In order to achieve this move forward, forces must be combined. Therefore QSC is building a new… | iii cryptography, cryptography quantum | quantum, committee, outreach, backbone, traffic | 0 |
ferbi.nl | Explore Relexicon's diverse range of 100+ AI professionals ready to enhance your personal and professional life. Discover tailored AI solutions in cybersecurity, digital marketing, software development, and more. Meet your AI assistant… | cryptography specialist | psychologist, analyst, teacher, reynolds, bennett | 0 |
gouwart.nl | Ready to start your next design project with me? That's great! Give me a call or send me an email and I will get back to you as soon as possible! | | painting, discover, installation, scenery, creativity | 0 |
sjoerdlangkemper.nl | Passwords are typically not stored plaintext in a database. Instead, a cryptographic hash is stored. This makes it possible to check the password, but makes it hard to get the plaintext password, even if the database is leaked. The way… | | header, attack, request, vulnerability, csrf | 0 |
c5n.nl | Codicon is an IT company that is specialized in, among other things, software, hardware, cyber security, consultancy and more. | | section, react, computing, developement, pricing | 0 |
droidcon.nl | Ali Parr is currently heading up Mobile Platform Partnerships Engineering for Facebook in EMEA. Ali is focused on (more) | implement cryptography, cryptography android | talk, parr, venue, tonight, emea | 0 |
gijsvandam.nl | …channels along a possible route, the proposed route can fail for lack of liquidity. So the sender is forced to try routes until it stumbles upon one that has enough liquidity to relay the payment; it's a process of trial and error. To… | | payment, signature, git, balance, paper | 0 |
xdna.nl | Contact… Lees… | advance cryptography | artificial, intelligence, disruptive, response, detection | 0 |
zerosumsecurity.nl | Home… Training… Support… Slide… | | slide, deck, interactive, untitled | 0 |
optisec.nl | …for both experienced and inexperienced people and opens the door to any specialization. Both penetration testers and security managers benefit greatly from CISSP, as it provides insights into the entire field of information security. | | certified, cissp, official, domain, topic | 0 |
fuse5g.nl | unauthorised access have become paramount. Establishing a dedicated forum where professionals from across industry, academia and government can come together to discuss the current state of mobile network security is critical to addressing… | | fuse, talk, quantum, slide, committee | 0 |
ceesjansen.nl | …News… Announcements… Contact… Dutch… English… Scroll down to content… Privacy | | astrology, metaphysics, announcement, triangle, wire | 0 |