Cryptography Research

Results: 540



#Item
351Computing / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Verisign / IPv6 deployment / ICANN / Internet / Domain name system / Network architecture

CASEY DECCIO SENIOR RESEARCH SCIENTIST Education B.S., Computer Science, Brigham Young University, Provo, UT M.S., Computer Science, Brigham Young

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-02-27 16:00:03
352Technology / Business / International Traffic in Arms Regulations / United States Munitions List / Export / International relations / OECC / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

EXPORT CONTROLS DECISION TREE OFFICE FOR EXPORT CONTROLS COMPLIANCE (OECC) Is the equipment, software, or technology involved in my research designed for, or can it be modified for military use or for use in outer space;

Add to Reading List

Source URL: exports.northwestern.edu

Language: English - Date: 2014-06-30 16:30:08
353Association of Public and Land-Grant Universities / University of Alabama at Birmingham / Digital signature / Social Security / Cyberwarfare / Cryptography / Taxation in the United States / Civil law

UAB RESEARCH FOUNDATION REVENUE DISTRIBUTION AGREEMENT

Add to Reading List

Source URL: www.uab.edu

Language: English - Date: 2012-08-16 12:51:09
354Public-key cryptography / Electronic commerce / Bethesda /  Maryland / National Institutes of Health / Nursing research / Confidentiality / Public key certificate / Medical privacy / Medicine / Health / Ethics

Microsoft Word - Instructions for obtaining a certificate of confidentiality

Add to Reading List

Source URL: depts.washington.edu

Language: English - Date: 2004-12-14 18:04:48
355Electronics / Science / Cryptography / BMP file format / JPEG / Data compression / Padding / Transport Layer Security / Computing / Graphics file formats / Formal sciences

TLS Compression Fingerprinting and a Privacy-aware API for TLS Karthikeyan Bhargavan, INRIA, [removed] C´edric Fournet, Microsoft Research, [removed] Markulf Kohlweiss, Microsoft Researc

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2012-05-29 03:39:10
356Cryptography / Randomness

SPR SOCIAL POLICY RESEARCH ASSOCIATES PY 97 SPIR Data Book June 1, 1999

Add to Reading List

Source URL: wdr.doleta.gov

Language: English - Date: 2002-06-04 09:29:28
357Cryptographic protocols / Electronic commerce / Hacking / Transport Layer Security / Certificate authority / Phishing / X.509 / Public key certificate / Vulnerability / Cryptography / Public-key cryptography / Key management

Venafi Labs Q3 Heartbleed Threat Research Analysis Majority of Global 2000 Organizations Have Not Remediated Heartbleed, Remain Vulnerable to Cyber Attacks Contents

Add to Reading List

Source URL: www.venafi.com

Language: English - Date: 2014-08-27 17:59:20
358SHA-1 / SHA-2 / Merkle–Damgård construction / Hash function / Crypt / Provably secure cryptographic hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
359FIPS 140 / Smart card / Challenge-response authentication / Critical Security Parameter / Public-key cryptography / Hardware security module / Security of automated teller machines / Cryptography / Computer security / Cryptography standards

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.7 FIPS[removed]Non-Proprietary

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-11-30 00:00:00
360Leonard Adleman / Adi Shamir / MD4 / Turing Award / RSA / MD5 / Public-key cryptography / Cryptanalysis / International Association for Cryptologic Research / Cryptography / Turing Award laureates / Ron Rivest

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:59:48
UPDATE