Advanced Encryption Standard

Results: 1268



#Item
601Computing / Mobile computers / Wireless networking / Advanced Encryption Standard / EMC Corporation / SecurID / Personal digital assistant / Hospital information system / Security token / Technology / Medical informatics / Medicine

Journal of the American Medical Informatics Association Application of Information Technology j

Add to Reading List

Source URL: people.dbmi.columbia.edu

Language: English - Date: 2004-09-16 08:55:38
602Statistics / Evaluation methods / Methodology / Survey methodology / Market research / Questionnaire / Advanced Encryption Standard / Computer-assisted telephone interviewing / Research methods / Science / Data collection

Recent projects in Statistics Finland’s Cognitive Laboratory - and something about the future Marjaana Järvensivu Statistics Finland

Add to Reading List

Source URL: wwwn.cdc.gov

Language: English - Date: 2014-02-07 06:44:36
603Business / Money / Overdraft / Direct debit / Advanced Encryption Standard / Authorization hold / Cheque / Bank / Non-sufficient funds / Payment systems / Banking / Finance

SC-EFT1-PS frontsingle0904.pdf

Add to Reading List

Source URL: www.riheaa.org

Language: English - Date: 2010-02-12 09:51:13
604Natural language processing / Evaluation methods / Computational linguistics / Sentiment analysis / Reliability engineering / Rubric / Advanced Encryption Standard / Automation / Knowledge / Science / Education

Language Learning & Technology http://llt.msu.edu/issues/june2014/review2.pdf June 2014, Volume 18, Number 2 pp. 65–69

Add to Reading List

Source URL: llt.msu.edu

Language: English - Date: 2014-05-20 18:56:50
605Advanced Encryption Standard / Fuel cell / Energy storage / Technology / Engineering / Hydrogen economy / Hydrogen technologies / Energy conversion

Date of Issuance[removed]COM/MP1/jt2 Decision[removed]February 25, 2010 BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA

Add to Reading List

Source URL: www.cpuc.ca.gov

Language: English - Date: 2014-12-03 08:54:09
606Analytical chemistry / Inductively coupled plasma atomic emission spectroscopy / Inductively coupled plasma mass spectrometry / Atomic emission spectroscopy / Mass spectrometry / Inductively coupled plasma / Advanced Encryption Standard / Matrix / Quality assurance / Chemistry / Scientific method / Science

SOP HW-2a Revision 15 December 2012 NOTICE The policies and procedures set forth here are intended as guidance to the United States

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-02-21 11:39:07
607Clinical research / Pharmaceutical industry / Chiropractic / Adverse event / Veterinary chiropractic / Spinal manipulation / Epidemiology / Advanced Encryption Standard / Medicine / Health / Alternative medicine

Serious adverse events associated with paediatric complementary and alternative medicine Principal investigator Co-investigators

Add to Reading List

Source URL: www.cpsp.cps.ca

Language: English - Date: 2012-10-22 14:28:30
608Cryptographic software / Data security / Public-key cryptography / Key / Password / Passphrase / Information security / Encryption / Advanced Encryption Standard / Cryptography / Key management / Disk encryption

Std 16 Cryptographic Controls

Add to Reading List

Source URL: cio.ubc.ca

Language: English - Date: 2014-08-14 17:49:01
609Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
610NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
UPDATE