Crypto

Results: 1625



#Item
741Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
742Computing / Computer architecture / Virtual private networks / Computer security / Crypto-anarchism / UT-VPN / Computer network security / Internet privacy / Network architecture

Instructions for Online Registration for VPN Connection 1. The online registration form is available in http://vpn.nic.in site. 2. The Section I of the form has to be filled by the user who will be accessing VPN services

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-01-22 23:24:57
743SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
744Network protocols / Computer network security / Crypto-anarchism / Internet privacy / Virtual private network / Broadview Networks / MPLS VPN / Private IP / Network architecture / Computer architecture / Computing

800 Westchester Ave. Suite N-501 Rye Brook, NY2200 Product-Specific Terms & Conditions

Add to Reading List

Source URL: corporate.broadviewnet.com

Language: English - Date: 2014-11-05 14:29:55
745Quantum information science / Quantum cryptography / Canada Research Chairs / Quantum key distribution / Institute for Quantum Computing / Secure Communication based on Quantum Cryptography / Michele Mosca / Quantum computer / Centre for Applied Cryptographic Research / Cryptography / Quantum mechanics / Theoretical computer science

Quantum-Safe-Crypto Workshop Programme Committee - Biographies Charles BROOKSON, ETSI OCG Security Chairman Charles worked recently in the Department for Business, Innovation and Skills of the United Kingdom Government f

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2013-09-25 02:21:27
746Crypto-anarchism / Internet privacy / Network architecture / Virtual private network / Universal Serial Bus / Global Technology Associates /  Inc. / Computer network security / Computing / Computer hardware

PDF Document

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-04-21 16:09:33
747Serge Vaudenay / Correlation attack / Technology / Correlation and dependence / Linear feedback shift register / Bluetooth / Computing / Cryptography / Pseudorandom number generators / Covariance and correlation

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-09-01 16:50:50
748

PPCoin: Peer-to-Peer Crypto-Valuta met Proof-of-Stake Sunny King, Scott Nadal , ) 19 Augustus 2012 Abstract Een peer-to-peer crypto-valuta ontwerp afgeleid van Satoshi Nakamo

Add to Reading List

Source URL: www.peercoin.net

Language: Dutch - Date: 2014-03-30 13:50:01
    749

    Crypto-World Informační sešit GCUCMP ISSNRočník 16, číslokvěten

    Add to Reading List

    Source URL: www.crypto-world.info

    Language: Czech - Date: 2014-07-21 16:43:26
      750

      Vondruška, P.: Kryptologie, šifrování a tajná písma, nakladatelství Albatros, edice OKO, Praha, 2006 Ukázka z kapitoly 1. Abychom si rozuměli … Dešifrování Dešifrování je opačný proces k šifrování.

      Add to Reading List

      Source URL: www.crypto-world.info

      Language: Czech - Date: 2006-09-29 18:22:44
        UPDATE