Dov Gordon, Jonathan Katz, and Vinod Vaikuntanathan, "A group signature scheme from lattice assumptions," in Advances in Cryptology
- Asiacrypt 2010, LNCS 6477, pp.
Yasuda, "The security and performance of 'GCM' when short multiplications are used instead," in Information Security and Cryptology
Wiener, "Parallel collision search with cryptanalytic applications," Journal of Cryptology
Reportedly, IdenTrust provides advanced cryptology
systems, recognised by global financial institutions, government agencies and corporations around the world.
There have been plenty of 'light reading' books covering the history and mechanics of cryptology
- this isn't one of them.
represents an increasingly important discipline of our time.
Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology
: Proceedings of (CRYPTO '84), vol.
Segev, "Attribute-Based Encryption for Arithmetic Circuits," Cryptology
ePrint Archive, Report 2013/669, 2013, http://eprint.iacr.org/2013/669/.
A preliminary version of this paper appears in the 14th International Conference on Information Security and Cryptology
, ICISC 2011 .
Ecetin based her claims on explanations and documents from Ramazan DE-ndar, a cryptology
expert at MyT.
(The full paper appeared Cryptology
ePrint Archive Report 2009/385)
Government security standards around cryptology
are of necessity extremely high.
The app allows users to make and send real-time, end-to-end encrypted voice and text messages using the very best in cryptology
, key management and information security techniques.
Two shops on the School of Mines and Technology campus, 25 miles from Mount Rushmore, are experimenting with a futuristic science called Biocryptology- a mix of biometrics (using physical traits for identification) and cryptology
(the study of encoding private information).
SafeNet is indeed at the forefront of cryptology
and IT security, a critical piece of the IT industry.