Function key

Results: 1153



#Item
981Cryptanalysis / Cryptographic hash function / Ciphertext / Linear cryptanalysis / FEAL / Advanced Encryption Standard / Cube attack / Cipher / Stream cipher / Cryptography / Symmetric-key algorithm / Block cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English
982Pseudorandom number generators / Entropy / National Security Agency / Advanced Encryption Standard / Cryptographic hash function / Random number generation / Hash function / Key / Crypt / Cryptography / Randomness / Information theory

Comments on SP 800-90A[removed]Paul Lambert ............................................................................................................................ 2 Ashit Vora, Acumen Security ......................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-11 14:30:31
983Management / Markets in Financial Instruments Directive / Business / Law / Finance / Corporations law / European Union directives / Corporate governance

EBA/GL[removed]November 2012 Guidelines on the assessment of the suitability of members of the management body and key function holders

Add to Reading List

Source URL: www.bankofgreece.gr

Language: English - Date: 2013-07-19 05:16:27
984Email / Plug / Technology

EBA Meeting Registration Form for:   Public hearing on the consultation paper on draft Guidelines for assessing the suitability of members of the management body and key function holders of a credit institution 1st Jun

Add to Reading List

Source URL: www.eba.europa.eu

Language: English - Date: 2014-02-20 06:58:33
985High-throughput screening / Inverse function / Science / Drug discovery / Building engineering / Materials science

Materials by Inverse Design Materials by Design in Three Steps During this Summer School, we will discuss the three key steps and further details of the inverse design approach described below:

Add to Reading List

Source URL: www.centerforinversedesign.org

Language: English - Date: 2012-06-05 13:47:43
986Formal methods / Unified Modeling Language / Logic in computer science / Postcondition / Object-oriented programming / Operation contracts / ECO / KeY / Function / Theoretical computer science / Software engineering / Mathematics

Electronic Communications of the EASST Volume[removed]Proceedings of the Workshop on OCL and Textual Modelling (OCL 2011)

Add to Reading List

Source URL: www.brucker.ch

Language: English - Date: 2011-12-04 09:41:24
987Hashing / Error detection and correction / Public key certificate / Certificate authority / Hash tree / Cryptographic hash function / Extensible Storage Engine / Digital signature / Hash function / Cryptography / Public-key cryptography / Key management

Certificate Transparency v2.1a Ben Laurie ([removed]) Emilia Kasper ([removed]) Introduction

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2012-09-07 08:18:37
988On-screen display / IBM PC keyboard / Serial port / Function key / Computing / Electronics / Out-of-band management / Computer keyboard / Electronic engineering

INDUSTRIAL ELECTRONICS ON-SCREEN DISPLAY MODEL OSD V_6 (NT5) Unit 2, 6 PITINO CRT

Add to Reading List

Source URL: www.q-net.net.au

Language: English - Date: 2004-12-06 01:20:58
989VEST / T-function / Cryptographic nonce / Initialization vector / Weak key / ICE / Keystream / Cryptography / Stream ciphers / Salsa20

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆome Berbain2 , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:33:19
990Hashing / Error detection and correction / Public key certificate / Cryptographic hash function / Digital signature / Certificate authority / Hash tree / Extensible Storage Engine / Venti / Cryptography / Public-key cryptography / Key management

Certificate Transparency v2 Introduction The goal is to make it impossible (or at least very difficult) for a Certificate Authority to issue a certificate for a domain without it being visible to the owner of that domain

Add to Reading List

Source URL: sump2.links.org

Language: English - Date: 2012-07-31 18:43:33
UPDATE