Cryptography

Results: 21893



#Item
231

Quantum cryptography: a practical information security perspective∗ Kenneth G. Paterson, Fred Piper and R¨ udiger Schack Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2009-08-11 10:17:38
    232

    Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    - Date: 2013-09-19 10:39:36
      233

      Practice-Oriented Provable Security and the Social Construction of Cryptography Phillip Rogaway∗ May 22, 2009† Abstract

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      - Date: 2015-07-03 16:39:39
        234

        Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

        Add to Reading List

        Source URL: qist.lanl.gov

        - Date: 2004-07-27 17:15:17
          235

          Microsoft Word - Modulhandbuch-MI-advanced_cryptography-2012.doc

          Add to Reading List

          Source URL: cosec.bit.uni-bonn.de

          - Date: 2014-02-03 06:03:57
            236

            Financial Cryptography and Data Security Tenerife, Canary Islands, SpainJanuary 2010 Overview Financial Cryptography and Data Security is a major international

            Add to Reading List

            Source URL: fc10.ifca.ai

            - Date: 2009-11-18 05:04:28
              237Cryptography / Notary / Professional certification / Standards / Public key certificate

              COMMONWEALTH OF VIRGINIA Department of Small Business and Supplier Diversity Virginia Employment Service Organization Certification Application Organization Name: Address:

              Add to Reading List

              Source URL: sbsd.virginia.gov

              Language: English - Date: 2015-07-02 12:49:41
              238Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Huntington /  West Virginia / Registrar / Computer security / Information security

              Banner Student Access Request Office Location: 271 Huntington Avenue • Phone: • Fax:

              Add to Reading List

              Source URL: www.northeastern.edu

              Language: English - Date: 2015-06-25 11:31:34
              239Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

              GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

              Add to Reading List

              Source URL: www.cryptophone.de

              Language: English - Date: 2009-10-21 09:08:30
              240Cryptography / Economy / Financial services / West Bengal National University of Juridical Sciences / Cheque / Public key certificate

              THE WEST BENGAL NATIONAL UNIVERSITY OF JURIDICAL SCIENCES DR. AMBEDKAR BHAVAN, 12 LB BLOCK, SECTOR - III, SALT LAKE CITY KOLKATATEL.: http ://www.nujs.edu Application Form for Admiss

              Add to Reading List

              Source URL: nujs.edu

              Language: English - Date: 2016-04-06 00:46:01
              UPDATE