Cryptography

Results: 21893



#Item
791Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
792Cryptography / Dell / RSA Security / Regional Studies Association / RSA Conference / Royal Society of Arts / RSA / Funding of science

REGIONAL STUDIES ASSOCIATIONResearch Networks Handbook CONTENTS I.

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2016-07-21 09:04:37
793Computer architecture / Instruction set architectures / Computing / Reduced instruction set computing / RISC-V / Cryptography / Cryptographic primitive / Instruction set / Institute for Applied Information Processing and Communications

Efficient Cryptography on RISC-V Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
794Cryptography / Applied mathematics / Block cipher / Linear cryptanalysis / Cryptanalysis / Differential cryptanalysis / Rebound attack

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
795Cryptography / Fax / Office equipment / Telecommunications equipment / Public key certificate / Registrar

Employment Application Form 1. Full Name: Sex:

Add to Reading List

Source URL: www.umsb.edu.bt

Language: English - Date: 2015-10-29 07:26:19
796Jewish surnames / Security / Surname / Simson Garfinkel / Cryptography / Crime prevention / Information governance / National security / Garfinkel / Simson / Computer security

Introduction to Computer Security and Privacy Simson L. Garfinkel, Ph.D. http://www.simson.net/

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 11:48:48
797Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
798Computing / Cryptography / Internet / Secure communication / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Transport Layer Security / Cipher suite / Handshaking / Transmission Control Protocol

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
799Cryptography / Microsoft / Public-key cryptography / Key management / Public key infrastructure / Identity management / E-commerce / Public key certificate / Email / Privacy / Internet privacy / Mail

Property Exchange Australia Limited Lvl 35, Rialto North Tower 525 Collins Street MelbourneAdditional PEXA Digital Certificate

Add to Reading List

Source URL: www.pexa.com.au

Language: English - Date: 2016-07-26 01:37:08
800Theoretical computer science / Mathematics / Mathematical logic / Logic in computer science / Models of computation / Lambda calculus / Computability theory / Valuation / Denotational semantics / Combinatory logic / Holomorphic functional calculus

The key to blame: Gradual typing meets cryptography Jeremy Siek Philip Wadler Indiana University, USA

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2016-07-07 08:33:11
UPDATE