Cryptography Research

Results: 540



#Item
391Side channel attack / Luc / Cryptography Research / RSA / Fault injection / Cryptography / Power analysis / Institute for Applied Information Processing and Communications

The Non-Invasive Attack Testing Workshop (NIAT[removed]Accepted Papers Choosing Distinguishers for Differential Power Analysis Attacks Elisabeth Oswald, Luke Mather, and Carolyn Whitnall University of Bristol, Department o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-13 14:29:00
392Information / Internet Key Exchange / Station-to-Station protocol / IPsec / Key-agreement protocol / Internet Security Association and Key Management Protocol / Internet security / Diffie–Hellman key exchange / Online Certificate Status Protocol / Cryptographic protocols / Cryptography / Data

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2003-02-16 21:33:47
393Secure multi-party computation / Verifiable computing / Paillier cryptosystem / Cryptography / Cryptographic protocols / Homomorphic encryption

Cryptography Research Group X0 X1

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-08-27 15:09:41
394Pharmaceutical sciences / Clinical research / Clinical pharmacology / Pharmacology / United States Public Health Service / Digital signature / Advisory opinion / Electronic signature / Cryptography / Civil law / Food and Drug Administration

DEPARTMENT OF HEALTH & HUMAN SERVICES Public Health Service Food and Drug Administration

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2000-11-13 08:52:36
395Secure multi-party computation / Computing / Privacy / Cryptography / Computer security / Computer science / Actor model / Internet privacy / Cryptographic protocols / Ethics / Security

Security Research Group www.jeffersonswheel.org David Evans

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-07-22 14:21:36
396Physics / Quantum algorithm / Quantum computer / Quantum error correction / Quantum information / Quantum entanglement / Topological quantum computer / Quantum key distribution / Quantum cryptography / Quantum information science / Theoretical computer science / Quantum mechanics

Institute for Quantum Information Findings – [removed]Research themes at the IQI Quantum information science is an exciting emerging field that addresses how fundamental physical laws can be harnessed to dramatically

Add to Reading List

Source URL: www.iqi.caltech.edu

Language: English - Date: 2007-04-30 18:23:57
397Public-key cryptography

Research Paper Jens Hein and Alison Hoare Energy, Environment and Resources | April 2014 EUTR Competent Authority Survey

Add to Reading List

Source URL: www.chathamhouse.org

Language: English - Date: 2014-05-02 05:13:48
    398Security / Computing / Cryptographic software / Computer security / Georgia Tech Research Institute / Homeland Open Security Technology / OpenSSL / FIPS 140-2 / DHS Directorate for Science and Technology / Cryptography standards / Cryptography / United States Department of Homeland Security

    Press Office Science and Technology Directorate U.S. Department of Homeland Security Press Release July 19, 2012

    Add to Reading List

    Source URL: www.dhs.gov

    Language: English - Date: 2013-06-21 09:46:32
    399Health Insurance Portability and Accountability Act / Digital signature / Confidentiality / Cryptography / Privacy law / Data privacy

    DUA#__________________________ NC DHHS MH/DD/SA Integrated Research Database Data Use Agreement for Limited Data Set This Data Use Agreement (“DUA”) is effective on the ____ day of ________, 20__, (“Effective Date

    Add to Reading List

    Source URL: www.communitycarenc.com

    Language: English - Date: 2012-12-07 16:31:13
    400Knowledge / Health research / National Health and Nutrition Examination Survey / United States Department of Health and Human Services / Self-care / Comma-separated values / Codebook / Nutrition / Survey methodology / Cryptography / Science / Health

    [removed]What We Eat In America – Food Commodity Intake Database (WWEIA-FCID[removed]The EPA’s WWEIA-FCID database is used to calculate estimates of food intake. It is an integral component in the DEEM/Calendex model

    Add to Reading List

    Source URL: fcid.foodrisk.org

    Language: English - Date: 2013-03-27 16:54:18
    UPDATE