Hellman

Results: 440



#Item
201Porphyry copper deposit / New Gold / Porphyry / Matter / Geology / Visual arts / Economic geology / S&P/TSX Composite Index / Copper

DAY ONE – September 23 8:50am WELCOME P. Lewis, Chairman, Organising Committee THE BIG PICTURE Chair: Phil Hellman 9:00am Metallogenesis of eastern Australia: links to the tectonic

Add to Reading List

Source URL: www.smedg.org.au

Language: English - Date: 2011-04-13 11:09:43
202Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Diffie–Hellman key exchange / Semantic security / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia2,1 , Stanislaw Jarecki1, and Gene Tsudik1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
203Computational hardness assumptions / BLS / Schnorr signature / Forking lemma / Digital signature / XTR / ElGamal encryption / Random oracle / Diffie–Hellman problem / Cryptography / Public-key cryptography / Finite fields

A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
204Integer sequences / Finite fields / Public-key cryptography / Cryptographic protocols / Prime number / Richard Schroeppel / Quadratic sieve / Diffie–Hellman key exchange / RSA / Mathematics / Cryptography / Abstract algebra

The Evolution of Public Key Cryptography Martin E. Hellman Crypto ’99 Santa Barbara, CA August 18, 1999 ADD: Loren Kohnfelder and certificates

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-06-15 12:59:08
205Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
206Graphics hardware / Computing / Algebra / Numerical linear algebra / GPGPU / CUDA / GeForce 500 Series / LU decomposition / Nehalem / Video cards / Computer hardware / Nvidia

CUDA-based LU Factorization with pivoting for 10,000s of small dense matrices vs. Intel MKL Fredrik Hellman (HPC), Jimmy Pettersson (HPC), Ian Wainwright (HPC) Matrix size set 1 Rows = Columns

Add to Reading List

Source URL: www.hpcsweden.se

Language: English - Date: 2013-11-13 14:30:58
207National security / Computing / Public safety / Inter-process communication / Virtual synchrony / Key management / Computer security / Diffie–Hellman key exchange / Key-agreement protocol / Cryptographic protocols / Security / Crime prevention

High-Performance Secure Group Communication by Cristina Nita-Rotaru

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:28
208Diffie–Hellman key exchange / Hellman / Whitfield Diffie / Public-key cryptography / Finite field / Key exchange / Cryptography / Cryptographic protocols / Diffie–Hellman problem

DELARAM KAHROBAEI, City University of New York, City Tech and Graduate Center Public key exchange using extensions by endomorphisms and matrices over a Galois field I am presenting a joint work with H.T.Lam and V.Shpilra

Add to Reading List

Source URL: cms.math.ca

Language: English - Date: 2013-11-01 09:18:01
209Key management / Electronic commerce / RSA / Secret sharing / Digital signature / Verifiable secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / Cryptography / Public-key cryptography / Cryptographic protocols

Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
210Key management / Group Domain of Interpretation / Diffie–Hellman key exchange / Perfect forward secrecy / XTR / Key distribution / Internet Security Association and Key Management Protocol / IPsec / Cryptography / Cryptographic protocols / Public-key cryptography

NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:02:45
UPDATE