Function key

Results: 1153



#Item
151RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
152User interfaces / Bulletin board systems / Function key / Terminal / Cursor / Computer keyboard / Insert key / Vi / Software / Computing / Human–computer interaction

NETEDIT Editor NETEDIT Editor 3-1

Add to Reading List

Source URL: www.3k.com

Language: English
153Wave packet / Wave function / Discrete spectrum / Position operator / Quantum tunnelling / Solution of Schrödinger equation for a step potential / Schrödinger equation / Quantum mechanics / Physics / Quantum harmonic oscillator

Examples of TH questions for the PHY1222 2007 course. 1. Discuss qualitatevely and quantitatevely one or more key experiments that showed the need of quantum description of nature at small scales (Examples: Photoelectri

Add to Reading List

Source URL: cp3.irmp.ucl.ac.be

Language: English - Date: 2007-05-09 12:26:33
154Computer keyboards / Computing / User interface techniques / Function key / Human–computer interaction / Menu / Electronic engineering

ULTIMO QUICK PROGRAMMING GUIDE 2900 Adams Street, Suite A-30 Riverside, CA 92504

Add to Reading List

Source URL: aquaconserve.com

Language: English - Date: 2011-12-17 15:51:31
155RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
156Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
157Computing / Apple Keyboard / Keypad / Keyboard layout / Function key / Shift key / Caps lock / Num lock / Keyboard shortcut / Computer keyboards / Human–computer interaction / Apple Inc.

How to access the Keyboard and Enter Symbols on the Scan GunWhen typing in Passwords or performing tasks on the scan gun, there is at times, a need to enter symbols (or “special characters”) into a text b

Add to Reading List

Source URL: icbs.nwcg.gov

Language: English - Date: 2011-05-12 18:28:14
158Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
159Point spread function / Optical aberration / Microscopy / Adaptive optics / Deformable mirror / Fluorescence microscope / Camera lens / Astigmatism / Angular resolution / Optics / Atomic /  molecular /  and optical physics / Electromagnetic radiation

Deep 3D PALM/STORM imaging MicAO 3DSR - the key to combining depth and highest resolution Audrius Jasaitis, Grégory Clouvel and Xavier Levecq Imagine Optic, 18 rue Charles de Gaulle, 91400 Orsay, France

Add to Reading List

Source URL: www.imagine-optic.com

Language: English - Date: 2014-06-06 10:15:26
160Virtual reality / User interface techniques / Haptic technology / Mouse / Keyboard shortcut / Function key / Optimus Maximus keyboard / User interface / Human–computer interaction / Input/output / Computer keyboards

Métamorphe: Applications for ShapeChanging Keyboards Gilles Bailly Jonathan Deber Abstract

Add to Reading List

Source URL: www.gillesbailly.fr

Language: English - Date: 2013-08-04 17:49:57
UPDATE