Cryptography

Results: 21893



#Item
981Elliptic curve cryptography / Public-key cryptography / Finite fields / Hyperelliptic curve cryptography / Hyperelliptic curve / Cryptography / Mathematics / Science and technology / Science

MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-05-29 11:53:40
982Disk encryption / Software / Computer architecture / Computing / FDE / Android / Encryption / Cryptography

Power Analysis of Android Full Disk Encryption Advisor(s): Thomas Korak, Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
983Cryptography / Economy / Financial services / E-commerce / Email / Public key certificate / Transmission Control Protocol / Cheque

Request for Replacement Certificate - $10 August 2014 Use this form to request a replacement certificate packet. Your replacement packet will include a Certificate of Achievement/Certificate of Participation, membership

Add to Reading List

Source URL: www.nevadaregistry.org

Language: English - Date: 2014-07-29 19:31:38
984Computing / Cryptography / Software / Directory services / Domain name system / Free software / FreeIPA / Red Hat / Lightweight Directory Access Protocol / DNS zone transfer / SRV record / Certificate Server

FreeIPA Training Series FreeIPA Client and Server Improvements in version 3.0 Rob Crittenden & Martin Kosek

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:14:41
985Computing / Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Application firewall / Application security / Information security / Web application firewall / Michigan State University

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
986Abstract algebra / Algebra / Mathematics / Field theory / Algebraic surfaces / Algebraic curves / Elliptic curve / Polynomial / Supersingular elliptic curve / Finite field / Valuation / Abelian variety

The 2-adic CM method for genus 2 curves with application to cryptography P. Gaudry1,2 , T. Houtmann2 , D. Kohel3 , C. Ritzenthaler4 , and A. Weng2 1 LORIA - Projet SPACES

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2006-09-01 11:00:34
987Prevention / Security / Safety / Cybercrime / Crime prevention / Cryptography / National security / Password / Computer security / Accurizing / Plan

The System Administration Top 10 List David Parter The League of Professional System  Administrators

Add to Reading List

Source URL: www.ncsysadmin.org

Language: English - Date: 2006-12-28 11:41:47
988Cryptography / E-commerce / Key management / Public key infrastructure / Public-key cryptography / Public key certificate / Intertek

Certificate of Registration This is to certify that the quality management system of Medbio Inc. Main Site: 5346 36th Street SE, Grand Rapids, Michigan, 49512, USA

Add to Reading List

Source URL: medbioinc.com

Language: English - Date: 2016-01-05 11:30:24
989Notary / Law / Common law / Cryptography / Notary public / Deed / Public key certificate / Moa / Act

DOMESTIC SHIPPING OFFICE I. APPLICATION TO AUTHORITY TO ACQUIRE THRU IMPORTATION/OUTRIGHT PURCHASE Pre-Approval Documents

Add to Reading List

Source URL: www.marina.gov.ph

Language: English - Date: 2015-08-15 03:04:55
990Computing / Internet / Cryptography / Computer network security / Internet Standards / Directory services / Cryptographic protocols / Secure communication / Safe Software / Kerberos / Transport Layer Security / HTTPS

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24
UPDATE