Cryptography

Results: 21893



#Item
821Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
822Security / Crime prevention / Technology / Cryptography / Information governance / National security / Receptionist / Computer security / Short Message Service

Receptionist Reports to: Lead Receptionist Division: Everts Air Cargo Department: Human Resources

Add to Reading List

Source URL: www.evertsair.com

Language: English - Date: 2012-10-26 13:02:47
823Computing / Security / Cloud computing / Cloud infrastructure / Computer security / Cryptography / National security / Cloud computing security / Information security / Cloud computing issues / Cloud broker

Security for Cloud Computing: 10 Steps to Ensure Success http://www.cloud-council.org/resource-hub.htm#security-for-cloud-computing-10steps-to-ensure-success March, 2015 The Cloud Standards Customer Council

Add to Reading List

Source URL: www.cloud-council.org

Language: English - Date: 2016-08-12 16:58:13
824Algebra / Mathematics / Abstract algebra / Finite fields / Binary operations / Root-finding algorithms / Field theory / Square root / Exponentiation / XTR / Methods of computing square roots / Pi

Introduction A Linear Algebra Approach for Computing the Square Root Applications of Square Root in Cryptography Conclusion Low Complexity Bit-Parallel Square Root

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2012-12-15 22:49:56
825Cryptography / Mathematics / Card shuffling / Randomness / Pseudorandom permutation / Random permutation / Shuffling / Combination / Limit of a function

Sometimes-Recurse Shuffle Almost-Random Permutations in Logarithmic Expected Time Ben Morris1 Phillip Rogaway2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-01 23:51:51
826Cryptography / Public-key cryptography / E-commerce / Public key infrastructure / Key management / Computer security / Public key certificate / SOA Security

information leakage malicious intermediary information leakage information leakage malicious intermediary insufficient authorization

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:18:27
827Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
828Economy / ECC / Department of Labor and Employment / Social Security / Insurance / Elliptic curve cryptography / Data Matrix

Add to Reading List

Source URL: ecc.gov.ph

Language: English - Date: 2016-01-13 01:39:23
829Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
830Computing / Cryptography / Internet / Secure communication / Internet Standards / Cryptographic protocols / Internet protocols / Internet security / Transport Layer Security / Client certificate / Handshaking / OpenSSL

TLS 1.3: A Collision of Implementation, Standards, and Cryptography Eric Rescorla Mozilla

Add to Reading List

Source URL: www.cryptoexperts.com

Language: English - Date: 2016-05-30 09:49:30
UPDATE