Function key

Results: 1153



#Item
121

INVESTIGATION B3 B3  Relating Launch Speed and Range Key Question: What function relates the range and launch speed of a projectile?

Add to Reading List

Source URL: www.cposcience.com

Language: English - Date: 2014-10-24 13:15:26
    122Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

    SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

    Add to Reading List

    Source URL: cryptojedi.org

    Language: English - Date: 2014-10-04 10:08:48
    123Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    124

    NeoScrypt, a Strong Memory Intensive Key Derivation Function

    Add to Reading List

    Source URL: www.ftc-c.com

    Language: English - Date: 2014-07-28 11:00:04
      125Cryptography / Applied mathematics / Block cipher / Stream cipher / Cryptographic hash function / Cryptanalysis / Data Encryption Standard / Joan Daemen / VEST / Cipher / Symmetric-key algorithm / Selected Areas in Cryptography

      PDF Document

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:23
      126Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

      Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

      Add to Reading List

      Source URL: www.cs.technion.ac.il

      Language: English - Date: 2014-05-26 22:22:44
      127RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

      CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2015-02-11 11:47:35
      128Nephrology / Organ failure / Kidney diseases / Renal physiology / Acute kidney injury / LCN2 / Renal function / Biomarker / Renal failure / Anatomy / Medicine / Biology

      NGAL Changing the diagnosis of acute kidney injury Key abstracts Review Neutrophil gelatinase-associated lipocalin: a troponin-like

      Add to Reading List

      Source URL: ngal.com

      Language: English - Date: 2011-11-04 04:48:40
      129Cryptographic hash function / Hash function / SHA-1 / Tiny Encryption Algorithm / Free60 / Homebrew / Cryptography / Xbox / Search algorithms

      Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

      Add to Reading List

      Source URL: www.xenatera.com

      Language: English - Date: 2003-04-17 04:53:36
      130Key management / PAdES / XAdES / CAdES / Digital signature / European Telecommunications Standards Institute / Electronic signature / Cryptographic hash function / Public key certificate / Cryptography / Cryptography standards / Public-key cryptography

      TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

      Add to Reading List

      Source URL: www.etsi.org

      Language: English - Date: 2015-05-12 09:17:43
      UPDATE