mouha.be | I have over 17 years of experience doing research in cryptography. In 2012, I obtained a Ph.D. degree. Besides my research, I am involved various standardization activities, mainly at NIST and ISO. | researcher cryptography, research cryptography, cryptography degree | researcher, overflow, attack, talk, committee | 8 |
link2trust.be | How to Implement Cryptography Governance in Your Company The use of cryptography is becoming increasingly widespread as businesses seek to protect their data and communications. However, the implementation of cryptography can be a complex and daunting task. This blog post will provide an overview… | company cryptography, cryptography architecture, importance cryptography, cryptography governance, use cryptography | security, ahead, governance, road, pki | 8 |
kjoo.be | agile ai artificial intelligence blockchain businessanalysis Cryptocurrency cryptography Distributed Ledger Technology fun history internet quantum quantumcomputing Quantum Computing rant security softwaredevelopment team | cryptocurrency cryptography, cryptography ledger, businessanalysis cryptography, cryptography security | quantum, security, blockchain, analysis, engineering | 6 |
iunknown.be | active directory C++ com cryptography development funny Group Policy hotsauce internet journal Local Security Policy LSA memory-management nihongo onikudaki personal politics powershell random Registry Security socialmedia soup SQL Server transaction win32 windows 日本語 | article cryptography, cryptography template, com cryptography, cryptography development | june, security, slice, soup, thing | 4 |
cybersecuritychallenge.be | Based on the principles of a Capture The Flag (CTF) , this computer security competition is a challenge-based game played by teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering… | issue cryptography, cryptography reverse, category cryptography, cryptography web, engineering cryptography | challenge, security, cyber, prize, edition | 3 |
heydari.be | I am a cryptography research scientist at Bell Labs and a Postdoc at COSIC ( KU Leuven ) (advised by Prof. Nigel Smart ). Previously, I worked as a PostDoc at imec-DistriNet (advised by Prof. Wouter Joosen ) where I also completed my PhD in 2021. | | research, lab, system, security, previously | 2 |
cryptosecurity.be | Cyberattacks are a real issue for institutions dealing with classified information. Access to unauthorized persons and the disclosure of classified information can have serious consequences for our institutions and their functioning. Cybersecurity has become a major concern. In this context, the… | use cryptography, cryptography central | security, accreditation, cybersecurity, system, legal | 2 |
blockchainglobal.be | A cryptocurrency is a medium of exchange like normal currencies such as USD, but designed for the purpose of exchanging digital information through a process made possible by certain principles of cryptography. Cryptography is used to secure the transactions and to control the creation of new… | principle cryptography, cryptography transaction | blockchain, global, consultancy, investment, internationally | 2 |
rubdos.be | De Smet, R. , Blancquaert, R. , Godden, T. , Steenhaut, K. , & Braeken, A. (2024). Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors. Sensors, 24(3), Article 3. | curve cryptography, cryptography arm | thought, jun, gitlab, docker, dec | 1 |
digitalpainting.be | The trade in NFT is largely in cryptocurrency. Cryptocurrencies are not created by central banks but by users in a computer network, and transactions are not verified by individual banks but again by multiple computers in a network. Transactions are timestamped and stored in blocks using… | block cryptography, cryptography block | paint, print, color, artist, vector | 1 |
hansvi.be | The next step will be using my own functions to transmit and receive LoRa frames, because I don’t want to keep using an entire library for something that simple. Then I will make a short tour in cryptography. That will be interesting too because it is not easy to implement a good encryption scheme… | tour cryptography, cryptography interesting | lora, reply, frequency, entry, february | 1 |
qj.be | I have also been an invited lecturer at Polytech Nice Sophia since 2016, for graduate-level courses on network security, applied cryptography, and network monitoring. | security cryptography, cryptography network | network, security, resume, future, core | 1 |
dju.be | Encrypt in in Javascript, Javascript, decrypt decrypt in in PHP, PHP, using using public-key public-key cryptography cryptography - - Stack Stack Overflow | key cryptography, cryptography stack | photography, youtube, light, photographer, lightroom | 1 |
bramkelchtermans.be | It has been said that data is the new oil. This means that this data must be properly secured. With the help of firewalls, cryptography and other measures, we ensure that no unwanted guests enter the network. | firewall cryptography, cryptography measure | network, system, user, security, science | 1 |
ev1z.be | On nights, I either work on endless side projects related to IP networks, cybersecurity, cryptography, or music. Or, you know, I drink beer. | cybersecurity cryptography, cryptography music | network, server, security, pi, dns | 1 |
cryptona.be | Improve security through better processes and technology. Security is prone to human error. Especially in cryptography-based security, doing things correct is vital. When done right, it brings a completely new world of possibilities, enabling you to do complex things in a simple way. | especially cryptography, cryptography security | secure, certificate, vault, security, cryptographic | 1 |
lerman.be | …university. During my PhD thesis, I was a teaching assistant and a student doing research as part of a Machine Learning Group (MLG) and the Cryptography and Security Service (QualSec). The supervisors of my thesis were Professor Gianluca Bontempi and Professor Olivier Markowitch . During the… | mlg cryptography, cryptography security | research, teach, security, lab, learn | 1 |
brieuc.be | High communication skills. Popularization in different domains like A.I. , Complexity Algorithmic, network, Cryptography, … | | strategy, operational, governance, game, degree | 1 |
jenshermans.be | Before that I was a researcher at the COSIC group, department of Electrical Engineering, KU Leuven. My main research topic is security and cryptography for the real world . More specifically I worked on the analysis and design of protocols, human-computer interaction in security and, in general… | security cryptography, cryptography real | research, authentication, ceo, currently, secure | 1 |
smalsresearch.be | Skip to primary content… Skip to secondary content… Home… Publications… Technos… Research reports… | | research, security, cloud, smart, computing | 0 |
splynter.be | At Splynter we want to holistically improve your cyber security posture through a vendor-independent, risk-based approach that combines high-quality security architecture, in-depth technical cyber security expertise and cyber security training. | complex cryptography, cryptography solution | security, cyber, risk, depth, approach | 0 |
matthiasvanderhallen.be | As a PhD researcher in the Declarative Languages and Systems group of KU Leuven, I researched the development of more expressive Knowledge Representation Languages and the solvers to support them. I specifically investigated how to extend languages with Second-Order and Higher-Order Logic… | security cryptography, cryptography separate | language, engineering, phd, knowledge, logic | 0 |
putty.be | We've generated a fresh set of GPG keys for signing PuTTY release and snapshot builds, since the old ones were due to expire. We will begin signing snapshots with the new snapshot key, and future releases with the new release key. For continuity, the new master key is signed with the old master… | unrestricted cryptography, cryptography law | key, ssh, release, mirror, list | 0 |
gijsvanlaer.be | My name is Gijs Van Laer, I'm a cryptographic engineer and information security consultant. Currently, I'm working at XFA , but do not hesitate to reach out for advice or other small projects. Below you can find a few of the services I can provide, but feel free to reach out if you have any… | phd cryptography, cryptography johns | security, university, cryptographic, research, advice | 0 |
tosu.be | Here are randomly generated valid bank account numbers. The Dutch bank account number (NL) has the bank code of an existing bank [1] . For Belgium, the bank code is a random number and may or may not match an existing bank. All generated bank accounts should pass most tests. If a invalid bank… | | number, race, nl, national, random | 0 |
nvoans.be | The National Security Authority… Security Clearances… FSC… Homologations… Physical installations… | | security, authority, national, clearance, physical | 0 |
gis-consultingshop.be | Many organisations have decided to self-manage data protection (regulated with the EU GDPR: General Data Protection Regulation) related matters and maybe appointed someone in the Legal or Security department to deal with the related topics. But is this person knowledgeable about data protection… | | security, gis, consulting, gdpr, awareness | 0 |
zupertails.be | Addictive Pokémon-themed card game from the creators of the all-popular card game series ‘Magic The Gathering’. It’s basically a gateway game to get you to play Magic AND there’s also a physical copy where you receive goodies for the online game per card pack. | | game, lan, beat, song, server | 0 |
nvrrdt.be | nvrrdt | Nothing more than thoughts. Might be developed once. For now, just some thoughts. | | thought, nov, proposal, function, compiler | 0 |
quintux.be | …Ingenieur) in Computer Sciences from developer over software architect, technical consultant, pre-sales consultant, team leader, IT manager and project leader over the past 20 years, I've learned at least one thing about myself: I love computer-technology and programming - and I'm good at it! | | language, implementation, reference, knowledge, pre | 0 |