Function key

Results: 1153



#Item
161Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
162Key management / Digital signature / Electronic signature / Non-repudiation / Public key certificate / Signature / CAdES / Cryptographic hash function / Digital signatures and law / Cryptography / Public-key cryptography / Notary

Abhinav International Monthly Refereed Journal of Research In Management & Technology Volume II, March’13 ISSN –

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2013-12-17 06:25:33
163Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions

Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 15:00:00
164Profilers / Software / Pin / Instrumentation / KeY / Theorem prover / Computer programming / Computing / Software optimization

Dynamic Binary Analysis and Instrumentation Covering a function using a DSE approach Jonathan Salwan Security Day Lille – France

Add to Reading List

Source URL: www.quarkslab.com

Language: English - Date: 2015-01-20 04:16:23
165Crime prevention / National security / Computer network security / Electronic commerce / Password / Phishing / Public-key cryptography / Kerberos / Cryptographic hash function / Cryptography / Security / Computer security

Contents Preface to the Second Edition xxv

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:58:34
166Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
167Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
168Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
169Key management / Diffie–Hellman key exchange / Ciphertext / Cryptographic hash function / Vigenère cipher / RSA / Key / Cryptanalysis / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

174 BLOWN TO BITS Lessons for the Internet Age Let’s pause for a moment to consider some of the lessons of cryptographic

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:42
170Computing / Computer keyboard / Keyboard shortcut / Control key / Mouse / Keyboard layout / Interaction technique / Function key / Cut /  copy /  and paste / User interface techniques / Human–computer interaction / Software

Métamorphe: Augmenting Hotkey Usage with Actuated Keys Gilles Bailly1 Thomas Pietrzak2

Add to Reading List

Source URL: www.gillesbailly.fr

Language: English - Date: 2013-02-09 13:41:26
UPDATE