Crypto

Results: 1625



#Item
381

kryptologie pro praxi Elektronický cestovní pas: Komunikační rozhraní Elektronické pasy jsou obãanÛm âeské republiky vydávány zhruba od poloviny loÀského roku. Jedná se pfiitom nejen

Add to Reading List

Source URL: crypto-world.info

Language: Czech - Date: 2008-04-23 13:15:55
    382

    klima.qxd:02

    Add to Reading List

    Source URL: crypto-world.info

    Language: Czech - Date: 2006-06-26 06:11:26
      383Cryptography / Email authentication / Cryptographic software / Mass surveillance / Internet privacy / Crypto Wars / Email encryption / Encryption / End-to-end encryption / BitLocker / National Security Agency / Surveillance

      Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

      Add to Reading List

      Source URL: cyber.law.harvard.edu

      Language: English - Date: 2016-01-31 21:23:48
      384

      CS255: Cryptography and Computer Security Winter 2016 Final Exam Instructions:

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2016-03-24 11:00:59
        385

        Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories August 20, 1994 Abstract

        Add to Reading List

        Source URL: crypto.com

        Language: English - Date: 2001-05-15 19:09:38
          386

          Safecracking for the computer scientist∗ Matt Blaze Department of Computer and Information Science University of Pennsylvania DRAFT – 7 DecemberRevised 21 December 2004) – DRAFT

          Add to Reading List

          Source URL: crypto.com

          Language: English - Date: 2005-03-21 19:18:35
            387Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

            Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

            Add to Reading List

            Source URL: www.ams.org

            Language: English - Date: 2015-03-10 15:36:10
            388

            Key Management in an Encrypting File System Matt Blaze AT&T Bell Laboratories Abstract As distributed computing systems grow in size,

            Add to Reading List

            Source URL: crypto.com

            Language: English - Date: 1999-11-26 23:55:04
              389

              Authentication codes Correlation attacks Coding theory as a tool in crypto Thomas Johansson Dept of EIT,

              Add to Reading List

              Source URL: indocrypt09.inria.fr

              Language: English - Date: 2010-01-14 06:48:16
                390

                Crypto 2.0 A Story of Generalization Bitcoin ● Decentralized digital currency ● Blockchain technology

                Add to Reading List

                Source URL: vitalik.ca

                Language: English - Date: 2014-07-27 20:21:32
                  UPDATE