Cryptography

Results: 21893



#Item
301Biometrics / Law enforcement / Law enforcement in the United States / Cryptography / Fingerprint / Fingers / Human anatomy / Identification / Live scan / FBI Criminal Justice Information Services Division / Government / Federal Bureau of Investigation

April 19, 2016 Changes to the FD-961 (Bioterrorism Risk Assessment Form) Webinar Q and A’s From whom should we be receiving expiration letters? The Federal Select Agent Program sends the expiration letters to the Resp

Add to Reading List

Source URL: www.selectagents.gov

Language: English - Date: 2016-05-06 11:33:39
302Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
303Quantum cryptography / Cryptography / Theoretical computer science / Quantum mechanics / Quantum key distribution / Quantum network / Quantum computing / Noisy-storage model / Nicolas Gisin / Artur Ekert / BB84

Programm_Qrypt2011_A5.indd

Add to Reading List

Source URL: www.qcrypt2011.ethz.ch

Language: English - Date: 2011-09-07 05:34:37
304Security / Cybercrime / Prevention / Cryptography / Safety / Identity documents / E-commerce / Social engineering / Password / Internet privacy / Computer security / Medical privacy

How to Keep Your Personal Information Secure

Add to Reading List

Source URL: www.documentdestruction.mobi

Language: English - Date: 2015-06-14 09:26:15
305Cryptography / Economy / International Electrotechnical Commission / Standards organizations / Kitemark / Product safety / BSI Group / Management system / Film speed / Public key certificate / Quality management

Certificate of Registration QUALITY MANAGEMENT SYSTEM - ISO 9001:2008 This is to certify that: Asset International Limited Stephenson Street

Add to Reading List

Source URL: www.weholite.co.uk

Language: English - Date: 2015-05-08 07:27:16
306Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

Add to Reading List

Source URL: fast.dpdk.org

Language: English - Date: 2016-07-28 16:30:34
307Cryptography / Password / Security / Prevention / American Farm Bureau Federation / Salt / Safety

The Largest Industrial Product Supplier in the United States Farm Bureau Deal Nationwide, this is one of the most sought out discount programs among Farm Bureau members. Many use this program to buy tools at incredible p

Add to Reading List

Source URL: www.idahofbstore.com

Language: English - Date: 2016-05-10 11:59:45
308Cryptography / NSF International / Professional certification / Public key certificate / Corrugated box design

Certificate of Registration This certifies that FT Green Bay Packaging Inc.

Add to Reading List

Source URL: gbp.com

Language: English - Date: 2016-04-04 17:19:51
309Homeomorphisms / Homomorphic encryption / Public-key cryptography / FHE / Cryptography / Academia / Mathematics

C:/Users/koblitz.NETID/Downloads/tight2.dvi

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2016-04-20 17:13:18
310Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:12
UPDATE