Cryptography

Results: 21893



#Item
771Cryptography / Theoretical computer science / Computational complexity theory / Theory of computation / Pseudorandomness / Random number generation / Randomness / Randomness extractor / Pseudorandom generator / Extractor / Advice / List decoding

Simple Extractors for All Min-Entropies and a New Pseudorandom Generator∗ Ronen Shaltiel † Christopher Umans ‡

Add to Reading List

Source URL: users.cms.caltech.edu

Language: English - Date: 2004-12-08 14:14:59
772Cryptography / Income tax in India / Permanent account number / Finance / Certified copy / Public key certificate

APPLICATION FORM FOR CERTIFICATE OF REGISTRATION (COR) OF HOUSING FINANCE COMPANIES UNDER SCETION 29A OF THE NATIONAL HOUSING BANK ACT, 1987 By Registered Post From: [Name and address of the Registered Office in BLOCK LE

Add to Reading List

Source URL: www.nhb.org.in

Language: English - Date: 2016-02-16 01:28:39
773Bitcoin / Cryptocurrencies / Alternative currencies / Cryptography / Economy / Money / Financial technology / Zerocoin / Secure multi-party computation / Distribution / IP

Fairness with Penalties Secure Cash Distribution End

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2015-11-16 07:13:33
774Security / Prevention / Cryptography / Computer law / Signature / National security / EIDAS / Biometrics / Ambient intelligence / Computer security / Information security / Electronic signature

EEMA online April 2015 Issue 7 EEMA Events eID: The business case for the banking and finance community 5 June 2015, Department for Business, Innovation and Skills, London Further to several multi-sector consultation mee

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
775Cryptography / Key management / Certificate authorities / Public key infrastructure / Transport Layer Security / E-commerce / Comodo SSL / Comodo Group / Extended Validation Certificate / Public key certificate / Root certificate / Outlook.com

Instant SSL Certificates Powerful, cost-effective security for e-commerce websites Why Instant SSL? • Highest levels of SSL security – 2048 bit digital signatures and up to 256 bit encryption

Add to Reading List

Source URL: www.instantssl.cn

Language: English - Date: 2013-01-17 06:29:07
776Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / San Jose State University / Computer security

DOCX Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:39
777Biometrics / Computer law / Cryptography / E-commerce / Electronic signature / Signature / Government Paperwork Elimination Act / Law / Security / Patriot Act /  Title III / Radiation Control for Health and Safety Act

1857 H.R. 4328, DIVISION C - OTHER MATTERS TITLE XVII—GOVERNMENT PAPERWORK ELIMINATION ACT

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2012-12-21 08:05:29
778Cryptography / Quality management / Quality management system / Professional certification / Public key certificate

TVET- Management Information System User Guidelines User Guidelines- TVET Management Information System

Add to Reading List

Source URL: 202.144.155.104

Language: English - Date: 2016-03-21 01:12:32
779Cryptography / Stream ciphers / Pseudorandom number generators / Solitaire / Keystream / Playing card

The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

Add to Reading List

Source URL: nifty.stanford.edu

Language: English - Date: 2006-02-28 18:53:58
780Cryptography / Computer access control / Certificate authority / Security token / Man-in-the-browser / Multi-factor authentication / Smart card / Authentication / IdenTrust

IdenTrust™ Trust Gate www Tr

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
UPDATE