Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Tadayoshi Kohno 19 found (24 total)

alternate case: tadayoshi Kohno

Threefish (1,332 words) [view diff] exact match in snippet view article find links to article

Schneier, Niels Ferguson, Stefan Lucks, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, and Jesse Walker. Threefish works on words of 64 bits
Mihir Bellare (341 words) [view diff] exact match in snippet view article find links to article
Encryption. His students include Michel Abdalla, Chanathip Namprempre, Tadayoshi Kohno and Anton Mityagin. Bellare is one of the authors of skein. In 2003
Serpent (cipher) (1,912 words) [view diff] exact match in snippet view article
John Kelsey; Doug Whiting; David Wagner; Chris Hall. Niels Fergusonk; Tadayoshi Kohno; Mike Stay (2000). "The Twofish Team's Final Comments on AES Selection"
Skein (hash function) (836 words) [view diff] exact match in snippet view article
Schneier, Niels Ferguson, Stefan Lucks, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas and Jesse Walker. Skein is based on the Threefish tweakable
Boomerang attack (864 words) [view diff] exact match in snippet view article find links to article
 156–170. Retrieved 2007-02-05. (Slides in PostScript) John Kelsey; Tadayoshi Kohno; Bruce Schneier (April 2000). "Amplified Boomerang Attacks Against
Substitution–permutation network (958 words) [view diff] exact match in snippet view article find links to article
Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker page 40. Katz, Jonathan; Lindell, Yehuda
Roxana Geambasu (481 words) [view diff] exact match in snippet view article find links to article
She completed her Ph.D. in 2011, with three advisors, Steve Gribble, Tadayoshi Kohno, and Hank Levy. Her dissertation was Regaining Control over Cloud and
Birthday attack (2,188 words) [view diff] exact match in snippet view article find links to article
values of x". Mathworks.com. Retrieved 29 October 2017. Mihir Bellare, Tadayoshi Kohno: Hash Function Balance and Its Impact on Birthday Attacks. EUROCRYPT
Pseudorandom number generator (3,312 words) [view diff] exact match in snippet view article find links to article
2007. p. 73. ISBN 978-0-387-48741-0. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno (2010). "Cryptography Engineering: Design Principles and Practical
Wireless identity theft (1,548 words) [view diff] exact match in snippet view article find links to article
things can reveal more information than we initially expect" stated Tadayoshi Kohno, an assistant professor of computer science, at University of Washington
Merkle–Damgård construction (1,961 words) [view diff] exact match in snippet view article find links to article
Franklin, ed, Springer-Verlag, 2004, pp. 306–316. John Kelsey and Tadayoshi Kohno. Herding Hash Functions and the Nostradamus Attack In Eurocrypt 2006
Advanced Encryption Standard (5,609 words) [view diff] exact match in snippet view article find links to article
John Kelsey; Doug Whiting; David Wagner; Chris Hall; Niels Ferguson; Tadayoshi Kohno; et al. (May 2000). "The Twofish Team's Final Comments on AES Selection"
TrueCrypt (6,401 words) [view diff] exact match in snippet view article find links to article
Alexei Czeskis; David J. St. Hilaire; Karl Koscher; Steven D. Gribble; Tadayoshi Kohno; Bruce Schneier (18 July 2008). "Defeating Encrypted and Deniable File
Gnomedex (3,497 words) [view diff] exact match in snippet view article find links to article
University of Washington Sara Davies Sarah Lacey Scott Maxwell from NASA Tadayoshi Kohno Tara Hunt (presented with Larry Halff from Magnolia) The main hall
Artificial cardiac pacemaker (8,992 words) [view diff] exact match in snippet view article find links to article
Benjamin Ransford; Shane S. Clark; Benessa Defend; Will Morgan; Kevin Fu; Tadayoshi Kohno; William H. Maisel (May 2008). Pacemakers and Implantable Cardiac Defibrillators:
Nike, Inc. (12,039 words) [view diff] exact match in snippet view article find links to article
Retrieved March 4, 2010. T. Scott Saponas; Jonathan Lester; Carl Hartung; Tadayoshi Kohno. "Devices That Tell On You: The Nike+iPod Sport Kit" (PDF). Archived
Tor (network) (16,219 words) [view diff] exact match in snippet view article
Retrieved 27 April 2022. McCoy, Damon; Kevin Bauer; Dirk Grunwald; Tadayoshi Kohno; Douglas Sicker. "Shining light in dark places: Understanding the Tor
Computer security (22,132 words) [view diff] exact match in snippet view article find links to article
Shacham; Stefan Savage; Karl Koscher; Alexei Czeskis; Franziska Roesner; Tadayoshi Kohno (2011). Comprehensive Experimental Analyses of Automotive Attack Surfaces
List of fellows of IEEE Computer Society (104 words) [view diff] exact match in snippet view article find links to article
spread spectrum and ultra wideband technologies and applications 2023 Tadayoshi Kohno For contributions to cybersecurity 2013 Joseph Konstan For contributions