Advanced Encryption Standard

Results: 1268



#Item
621Baltimore County /  Maryland / Task force / Federal Energy Regulatory Commission / Energy / Sparrows Point /  Maryland / Advanced Encryption Standard / Liquefied natural gas

Liquefied Natural Gas Task Force Meeting Summary for Nov. 17, 2006 Fleming Community Center Turners Station, MD Minutes for Nov. 1 meeting were reviewed and approved.

Add to Reading List

Source URL: www.mde.maryland.gov

Language: English - Date: 2013-12-02 23:04:45
622Pseudorandom number generators / Binary arithmetic / Linear feedback shift register / SNOW / Finite-state machine / A5/1 / Polynomial basis / Advanced Encryption Standard / Inner product space / Cryptography / Stream ciphers / Algebra

1 New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:50:57
623Stakeholder analysis / Systems analysis / Stakeholder / Evaluation / Advanced Encryption Standard / Business / Corporate finance / Public relations / Project management

Australasian Evaluation Society Conference[removed]Understanding Project Participants: Adding value through stakeholder analysis

Add to Reading List

Source URL: www.aes.asn.au

Language: English - Date: 2013-10-31 22:24:04
624Blowfish / Symmetric-key algorithm / KHAZAD / Block size / Square / Cipher / Advanced Encryption Standard / Data Encryption Standard / MARS / Cryptography / Block ciphers / Twofish

Programming with GNU Crypto Version 2.0.0, 9 November 2003 Casey Marshall Raif S. Naffah

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2003-11-08 19:11:09
625Field-programmable gate array / Advanced Encryption Standard / Lookup table / Data Encryption Standard / ICE / Block cipher / S-box / Xilinx / Bitstream / Cryptography / Computing / Reconfigurable computing

1 FPGA Trojans through Detecting and Weakening of Cryptographic Primitives Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, and Christof Paar, Fellow, IEEE Horst G¨ortz Institute for IT Security, Ruhr University Bochum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 14:41:24
626Side channel attack / Advanced Encryption Standard / Espionage / Algorithm / Block cipher / Fault injection / Applied mathematics / Cryptography / Theoretical computer science / Software testing

A Unified Formalism for Physical Attacks H´el`ene Le Bouder1,2 , Ronan Lashermes1,3 , Yanis Linge4 , Bruno Robisson1,3 , and Assia Tria1,3 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 11:07:10
627Standardized tests / Educational psychology / Evaluation methods / Knowledge / Graduate Management Admission Test / SAT / Advanced Encryption Standard / Validity / Feedback / Education / Evaluation / Inter-rater reliability

Automated versus Human Scoring: A Case Study in an EFL Context

Add to Reading List

Source URL: e-flt.nus.edu.sg

Language: English - Date: 2014-07-07 00:00:21
628Boolean algebra / Binary arithmetic / Linear feedback shift register / Stream cipher / Advanced Encryption Standard / Boolean function / Computational complexity theory / Recurrence relation / Correlation attack / Cryptography / Mathematics / Pseudorandom number generators

On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan and Teng Wu Department of Electrical and Computer Engineering University of Waterloo, Canada {ggong,kmandal,y24tan,teng.wu}@

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-14 12:04:50
629Software / Computing / ESET / Payment Card Industry Data Security Standard / Data security / Advanced Encryption Standard / USB flash drive / Filesystem-level encryption / Transparent Data Encryption / Disk encryption / Cryptography / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static2.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
630Cryptographic software / Computing / Antivirus software / ESET NOD32 / ESET / Data security / Advanced Encryption Standard / Encryption / BitLocker Drive Encryption / Cryptography / Disk encryption / Software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
UPDATE