Search Results - "lib python"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Authors: McGirl, Timothy

    Subject Terms: ''' Bitcoin, BLAKE3, AES-256-GCM, XChaCha20-Poly1305, Nostr, NIP-44, secp256k1, ECDH, cryptography, encryption, authenticated encryption, symmetric encryption, asymmetric encryption, key derivation, ephemeral keys, block hash, blockchain, censorship resistance, censorship circumvention, anti-censorship, metadata protection, metadata privacy, traffic analysis, traffic obfuscation, protocol obfuscation, deep packet inspection, DPI, DPI evasion, network surveillance, mass surveillance, privacy, privacy-preserving, anonymity, secure communication, secure messaging, encrypted messaging, end-to-end encryption, E2EE, transport layer security, transport encryption, decentralized communication, decentralized protocol, peer-to-peer, P2P, onion routing, Tor, pluggable transports, obfs4, steganography, covert channel, side-channel resistance, fingerprinting resistance, anti-fingerprinting, traffic fingerprinting, packet analysis, flow analysis, timing analysis, size analysis, padding, ISO 7816-4, Russian Doll encryption, layered encryption, nested encryption, defense in depth, key rotation, ephemeral encryption, forward secrecy, cost asymmetry, computational security, information security, network security, internet freedom, free speech, human rights technology, activism, journalism, whistleblowing, dissident communication, Great Firewall, internet censorship, network filtering, protocol detection, signature detection, machine learning detection, statistical analysis, entropy analysis, handshake elimination, zero-RTT, handshake-free, pre-shared key, PSK, blockchain oracle, timing oracle, global synchronization, distributed systems, consensus, proof-of-work, SHA-256, hash function, pseudorandom, CSPRNG, nonce, initialization vector, GCM, Galois Counter Mode, authenticated encryption with associated data, AEAD, MAC, message authentication, Schnorr signature, digital signature, public key cryptography, elliptic curve cryptography, ECC, Diffie-Hellman, key exchange, key agreement, relay, WebSocket, JSON, Base64, RFC 2119, technical specification, protocol specification, NIP, Nostr Implementation Possibility, open source, open protocol, interoperability, reference implementation, Rust, performance, low latency, high throughput, mobile, embedded systems, AES-NI, hardware acceleration, SPV, light client, block header, timestamp, lookback window, failure handling, graceful degradation, threat model, adversary model, security analysis, formal verification, indistinguishability, random oracle, PRF, PRP, semantic security, IND-CPA, cryptanalysis ''', traffic analysis, censorship resistance, metadata protection, Bitcoin, Nostr, ephemeral encryption, deep packet inspection, protocol obfuscation, BLAKE3, AES-256-GCM, NIP-44, decentralized communication

  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Source: Proceedings of the European Conference on Cyber Warfare & Security; 2022, p150-159, 10p

  19. 19
  20. 20

    Source: International Advances in Economic Research; Nov2022, Vol. 28 Issue 3/4, p155-170, 16p, 1 Diagram, 4 Charts, 3 Graphs

    Geographic Terms: INDIA