Function key

Results: 1153



#Item
201Emacs / Text editors / Line editor / Technical communication tools / Vi / Function key / Escape sequence / Control key / Arrow keys / Software / Computing / User interfaces

UNIX Basics JANE MARINSKY by Peter Collinson, Hillside Systems

Add to Reading List

Source URL: www.hillside.co.uk

Language: English - Date: 2001-11-27 10:06:41
202XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
203Red algae / Ocean acidification / Centre for Environment /  Fisheries and Aquaculture Science / Scientific modelling / Chemistry / Water / Oceanography / Maerl

Aim 3: Determining the effects of ocean acidification on the overall function of key benthic habitats

Add to Reading List

Source URL: www.oceanacidification.org.uk

Language: English - Date: 2013-11-15 10:10:50
204Medicine / Anatomy / Glucosamine / Chondroitin sulfate / Curcumin / Chondroitin / Cartilage / Dietary supplements / Glycosaminoglycans / Nutrition

Dietary supplement containing Glucosamine hydrochloride Chondroitin sulfate Bio-Curcumin BCM-95® Optimal joint function and safe range of movement depend on two key elements: a

Add to Reading List

Source URL: www.cartijoint.com

Language: English - Date: 2014-05-22 06:42:53
205ICE / Feistel cipher / Differential cryptanalysis / Key schedule / Differential of a function / Differential equation / Differential / Block cipher / Cryptography / MISTY1 / KASUMI

Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 07:22:52
206Apple Inc. / Keyboard layout / Rollover / Apple Keyboard / Arrow keys / Control key / Control-C / Control character / Function key / Computer keyboards / Human–computer interaction / Input/output

PDF Document

Add to Reading List

Source URL: bitsavers.trailing-edge.com

Language: English - Date: 2003-07-07 00:00:00
207Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
208Civil law / Digital signature / Key management / Post-quantum cryptography / Hash function / Stateless / Cyberwarfare / Applied mathematics / Cryptography / Public-key cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:46:07
209Hashing / MD5 / Search algorithms / Collision attack / Padding / X.509 / Hash function / RSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
210Internet privacy / Virtual private network / Network security / Computing / Computer network security / Network architecture / Crypto-anarchism

Customer Case Study Gas Transmission Operator GAZ-SYSTEM S.A. is a strategically important company for the Polish economy and a key pillar of the country’s energy security. Its principal function is the transport of ga

Add to Reading List

Source URL: www.gts.ro

Language: English - Date: 2013-04-02 11:56:20
UPDATE