Function key

Results: 1153



#Item
891Key size / Key / Cryptographic hash function / Symmetric-key algorithm / RSA / Cipher / Digital signature / PKCS / Crypt / Cryptography / Key management / Public-key cryptography

Comments received on SP[removed], Part 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-06 12:25:12
892Analytic geometry / Absolute value / Cartesian coordinate system / Function / Graph / Derivative / Signed graph / Mathematics / Elementary mathematics / Functions and mappings

BELLEVUE SCHOOL DISTRICT SUMMER PACKET Answer Key FOR STUDENTS GOlNG lNTO:

Add to Reading List

Source URL: www.bsd405.org

Language: English - Date: 2012-05-29 17:00:04
893Encryption / Keychain / Advanced Encryption Standard / Cold boot attack / Key derivation function / Brute-force attack / Dm-crypt / Password / Public-key cryptography / Cryptography / Disk encryption / Cryptographic software

Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-05-05 09:27:53
894Philosophy / Science / Literary criticism / Prague Linguistic Circle / Jan Mukařovský / Russian formalism / Structural functionalism / Formalism / Prague school / Aesthetics / Structuralism / Linguistics

Czech Structuralism in a nutshell The core of the Prague concept is the theory of function, i.e. the aspect of communication as a goaloriented intentional action/activity in a socio-historical context. Its key concepts o

Add to Reading List

Source URL: utrl.ff.cuni.cz

Language: English - Date: 2014-04-28 08:45:48
895Cryptographic hash function / Hash function / SHA-1 / Tiny Encryption Algorithm / Free60 / Homebrew / Cryptography / Xbox / Search algorithms

Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

Add to Reading List

Source URL: hackingthexbox.com

Language: English - Date: 2003-04-17 04:53:36
896Cryptographic protocols / Electronic commerce / Digital signature / Cryptographic hash function / Public key certificate / X.509 / Elliptic Curve DSA / SHA-2 / Cryptlib / Cryptography / Public-key cryptography / Key management

Integration of Digital Signatures into the Existing Object Memory Model (OMM) - Concept Paper Sascha Groß, S¨onke Knoch, Jens Haupert German Research Center for Artificial Intelligence (DFKI) Saarbr¨ ucken, Germany

Add to Reading List

Source URL: www.dfki.de

Language: English - Date: 2014-01-28 05:11:28
897Stream cipher / Cryptographic hash function / Pseudorandom number generator / Symmetric-key algorithm / Block cipher / Crypt / Cipher / Outline of cryptography / Cryptographically secure pseudorandom number generator / Cryptography / CRYPTREC / MUGI

Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
898Cryptographic hash function / Digital signature / Key / Provable security / CRYPTREC / Cryptography / Public-key cryptography / Key management

Report on Present State of DSA Signature Evaluation (full evaluation) January 28, 2002 Seiichi Susaki, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
899Function

Critical Business Functions Use this form to identify what business functions are critical to your survival. To help you get started, the following are some key questions to ask yourself: • What are my most critical a

Add to Reading List

Source URL: www.iclr.org

Language: English - Date: 2014-08-25 12:15:30
    900CRYPTREC / Hierocrypt / Symmetric-key algorithm / ABC / Cryptographic hash function / SC2000 / Q / Cipher / CIPHERUNICORN-A / Cryptography / Block ciphers / Stream ciphers

    CRYPTREC2001 Report on Present State of Symmetric-Key Cipher Evaluations January 28, 2002 Toshinobu Kaneko

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-06-19 04:38:45
    UPDATE