Cryptography Research

Results: 540



#Item
501Power analysis / Computer network security / Evaluation / Leakage / SHA-2 / Computer security / Advanced Encryption Standard / Evaluation approaches / Side channel attack / Electrical engineering / Cryptography / Security

Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks Paul Kocher Cryptography Research, Inc. 575 Market Street, 21st Floor

Add to Reading List

Source URL: www.smartcard.co.uk

Language: English - Date: 2010-09-10 06:35:51
502Quantum mechanics / Optics / Quantum cryptography / Photonics / Qubit / Quantum optics / Optical tweezers / Quantum computer / Quantum key distribution / Physics / Theoretical computer science / Quantum information science

news & views oPtiCaL traPPiNg Using their expertise in optical tweezers research and two-photon polymerization (2PP), researchers from Denmark and

Add to Reading List

Source URL: www.ppo.dk

Language: English - Date: 2009-05-28 08:49:18
503Genealogy / Public key certificate / Academic certificate / Cryptography / Civil law / Birth certificate

Strengthening Research, Education and Advocacy in Conflict, Peace and Development Studies Application for Registration for a PhD Degree IMPORTANT: (a) Application which is incomplete in any respect will be rejected.

Add to Reading List

Source URL: www.ruh.ac.lk

Language: English - Date: 2014-04-22 02:03:29
504Law / Research In Motion / S&P/TSX 60 Index / Term of patent / Patent / Economy of Canada / Elliptic curve cryptography / Reexamination / Civil law / Patent law / United States patent law / Intellectual property law

Serial No. _______________ Effective Date: ___________ Elliptic Curve Cryptography Patent License Agreement Between

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-15 13:07:34
505Cryptographic protocols / Secure multi-party computation / Trusted Computing / Information privacy / Privacy / Internet privacy / Statistical database / Secure two-party computation / Vulnerability / Cryptography / Computer security / Ethics

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
506Technology / Public administration / Civil law / Digital signature / Notary / Electronic signature / European Data Protection Supervisor / Framework Programmes for Research and Technological Development / E-Government / Cryptography / European Union / Open government

02. What next for e-Identity and e-Signatures.doc

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-09-19 08:24:20
507Telecommunications / Telecommunications data retention / Cryptography / Forensic science / Law enforcement in the United Kingdom / Complexity / Evidence / Science / Knowledge / Ethology

Inquiry into Terrorism Detention Powers Foundation for Information Policy Research (FIPR) Response to the Home Affairs Committee We were asked by the adviser to the committee to submit evidence on: • the need to decryp

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-02-13 09:07:04
508Computing / Onion routing / Tor / Mixminion / Mix network / Traffic analysis / Anonymous remailer / David Chaum / Routing / Internet privacy / Cryptography / Internet

Sleeping dogs lie on a bed of onions but wake when mixed Paul Syverson Naval Research Laboratory, USA. Abstract. We introduce and investigate sleeper attacks and explore

Add to Reading List

Source URL: www.syverson.org

Language: English - Date: 2012-03-07 09:26:38
509Information / Cryptography / Data / Intellectual property law / Business law / Trusted Computing / Anti-circumvention / Copyright / Intellectual property / Copyright law / Law / Monopoly

Date: Thu, 27 Apr 2006 10:20:07 +0100 To: Dear Sir, Thank you for the opportunity to contribute to your enquiry. The Foundation for Information Policy Research is an independent b

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-06-12 14:27:12
510Key management / Internet protocols / Public-key cryptography / Internet standards / Domain Name System Security Extensions / DNS root zone / Name server / Trust anchor / Digital signature / Cryptography / Internet / Domain name system

The EURid Insights series aims to analyse specific aspects of the domainname environment. The repor ts are based on sur veys, studies and research developed by EURid in cooperation with industr y exper ts and sector lead

Add to Reading List

Source URL: www.eurid.eu

Language: English - Date: 2012-12-10 05:43:45
UPDATE