Book:Cryptography

Results: 81



#Item
61Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
62Key management / Notary / Key / SHA-2 / Digital signature / X.509 / Authentication / Cryptography standards / Book:Cryptography / Cryptography / Public-key cryptography / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:23
63Internet protocols / Secure communication / Key / SHA-2 / Digital signature / Firewall / Book:Cryptography / Cryptography standards / Cryptography / Key management / Computer network security

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:23
64Cryptographic software / Encryption / SHA-2 / Digital signature / Key / Cryptography standards / Book:Cryptography / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:22
65Public-key cryptography / Digital signature / Key / SHA-2 / Cryptography standards / Book:Cryptography / Cryptography / Cryptographic software / Key management

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:22
66Privacy of telecommunications / Mass surveillance / Crime prevention / Privacy law / Telephone tapping / National Security Agency / Cryptography / Communications Assistance for Law Enforcement Act / Computer security / National security / Security / Surveillance

PART Three In the final section of the book, I cover three themes: politics, management, and assurance. Given that we now have some idea how to provide protection, the three big questions are: what are you allowed to do

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 09:42:31
67Computer security / Crime prevention / National security / Computer network security / Security engineering / Encryption / Vulnerability / Password / Tamper resistance / Security / Cryptography / Cyberwarfare

Security Engineering: A Guide to Building Dependable Distributed Systems PART One In this section of the book, I cover the basics of security engineering technology.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:54
68Cryptography / Science / Technology / Knowledge / Fellows of the Royal Society / Roger Needham / Locksmithing

About the Author Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:36:59
69Elliptic curves / Public-key cryptography / Elliptic curve cryptography / NTRU / Elliptic Curve DSA / Lattice problem / Counting points on elliptic curves / Hyperelliptic curve cryptography / Elliptic curve / Cryptography / Post-quantum cryptography / Finite fields

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:42:48
70Public key certificate / Public-key cryptography / Certificate of origin / Free trade area / Book:Kepler-11 / Cryptography / Electronic commerce / Key management

NAFTA Form no shadow[removed]:49 AM Page 1 DEPARTMENT OF THE TREASURY Approved through[removed]OMB No[removed]

Add to Reading List

Source URL: www.stapleton-spence.com

Language: English - Date: 2010-08-20 18:34:15
UPDATE