Function key

Results: 1153



#Item
341Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
342Computing / Assistive technology / Universal Serial Bus / Apple Keyboard / Control key / Function key / Speech synthesis / USB flash drive / Computer hardware / Computer keyboards / Apple Inc.

Model TS-04-NK v2.0 Integrated Speech Generation System

Add to Reading List

Source URL: www.textspeak.com

Language: English - Date: 2010-08-31 15:43:00
343Finite fields / Cryptographic protocols / Computational hardness assumptions / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / Digital signature / PP / One-way function / Cryptography / Abstract algebra / Mathematics

CS355: Topics in cryptography Spring 2014 Assignment #1 Due: Tuesday, May. 13, 2014.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-07 00:53:37
344Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
345Error detection and correction / Search algorithms / Cryptographic hash function / Hash function / Digital signature / Hash tree / RSA / Crypt / Cryptography / Public-key cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2004 Assignment #4 Due: Friday, March 12th. No late days allowed.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-03 16:21:52
346Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www-scf.usc.edu

Language: English - Date: 2012-11-10 17:20:30
347Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-05 20:38:49
348Physics / Resistor / Capacitive coupling / Printed circuit board / Electronic filter / Key / Parasitic capacitance / Touchscreen / Function key / Electromagnetism / Capacitors / Electronics

I:GOSELELogos_Inprogresse_r_temp_compressed.svgz

Add to Reading List

Source URL: pickandplace.files.wordpress.com

Language: English - Date: 2015-02-05 16:49:36
349Hashing / Error detection and correction / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / RSA / One-way compression function / Cryptography / Cryptographic hash functions / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-14 15:44:45
350Error detection and correction / Public-key cryptography / Hash function / Digital signature / RSA / Hash tree / Collision resistance / One-way compression function / UMAC / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-28 17:43:23
UPDATE