Black-box cryptography is dangerous III
Cryptographic libraries are readily available for developers to use and download however, many a times, developers do not understand or check the exact codes that they have downloaded and are implementing. Developers who do not check the implementation of the libraries and just use the libraries wit...
Saved in:
Main Author: | Lee, Esther Yu Ling. |
---|---|
Other Authors: | Leong Peng Chor |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/53222 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Elliptic curve cryptography on smart card
by: Zhang, Xing
Published: (2010) -
A survey on the cryptanalysis of elliptic curve cryptography
by: Mak, Wai Kit.
Published: (2010) -
RELATIVISTIC QUANTUM CRYPTOGRAPHY
by: JEDRZEJ KANIEWSKI
Published: (2015) -
Topics in cryptography
by: Koh, Edison Rui Xuan
Published: (2024) -
Pseudo-randomness in cryptography
by: Bansal Arushi
Published: (2024)