Attack

Results: 9771



#Item
921

Elliptic and hyperelliptic curves with weak coverings, ECC2007 Elliptic and hyperelliptic curves with weak coverings against Weil descent attack Jinhui Chao Joint work with Fumiyuki Momose

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:18
    922Diablo Range / Mount Diablo / Attack on Pearl Harbor / Diablo / Pearl Harbor Survivors Association / Beacon /  New York / Beacon

    Media Release, December 2nd, 2013 Contacts: Beryl Anderson, , Communications Manager at Save Mount Diablo Mount Diablo’s Beacon Will Shine Bright on Pearl Harbor Day

    Add to Reading List

    Source URL: www.savemountdiablo.org

    Language: English - Date: 2013-12-06 15:26:20
    923Domain name system / Internet / Top-level domains / Internationalized domain names / Country code top-level domains / .org / IDN homograph attack / .

    .tel Danish Language IDN Policy March 2015 .tel Danish Language IDN Policy March 2015

    Add to Reading List

    Source URL: d21po8gip7hnk5.cloudfront.net

    Language: English - Date: 2015-06-24 16:01:35
    924

    July 28, 2014 United States House Washington, DCRe: Oppose H.R. 4315 – An attack on the Endangered Species Act Dear Representative: The League of Conservation Voters (LCV) works to turn environmental values into

    Add to Reading List

    Source URL: www.lcv.org

    Language: English - Date: 2014-09-16 12:21:50
      925

      Volleyball Box Score 2015 Oregon State Volleyball #18 Oregon vs Oregon State (Sep 24, 2015 at Corvallis, Ore.) Attack E TA

      Add to Reading List

      Source URL: admin.xosn.com

      Language: English - Date: 2015-09-25 01:43:30
        926Domain name system / Internet / Top-level domains / Internationalized domain names / .org / Unicode / IDN homograph attack / .

        .tel Lithuanian Language IDN Policy March 2015 .tel Lithuanian Language IDN Policy March 2015

        Add to Reading List

        Source URL: d21po8gip7hnk5.cloudfront.net

        Language: English - Date: 2015-06-24 16:02:03
        927Religion / Humanities / Anthropology / Culture / Spirituality / Cognitive science of religion / Scott Atran / Ritual / Religiosity / Value / Mircea Eliade / Suicide attack

        Judgment and Decision Making, Vol. 7, No. 2, March 2012, pp. 110–118 Religion, group threat and sacred values Hammad Sheikh∗ Jeremy Ginges∗

        Add to Reading List

        Source URL: journal.sjdm.org

        Language: English - Date: 2012-03-29 11:51:33
        928Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

        Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

        Add to Reading List

        Source URL: tls.mbed.org

        Language: English - Date: 2016-01-19 07:39:30
        929

        MARCHISSUE # 4 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF THE CRIMEA

        Add to Reading List

        Source URL: www.scotlandrussiaforum.org

        Language: English - Date: 2016-03-04 13:30:09
          930

          A Timing Attack on Hyperelliptic Curve Cryptosystems

          Add to Reading List

          Source URL: conf.ncku.edu.tw

          Language: English - Date: 2003-12-19 01:13:44
            UPDATE