Key generation

Results: 481



#Item
131Advantage / Public-key cryptography / Key generation / Cryptography / Mihir Bellare / Ciphertext indistinguishability

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:59:14
132Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics

Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-18 22:21:28
133Cipher / Symmetric-key algorithm / Digital signature / Commitment scheme / Key generation / Key size / Key / RSA / Initialization vector / Cryptography / Key management / Public-key cryptography

Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:40:23
134Renewable energy policy / Renewable-energy law / Energy in the United Kingdom / Electricity generation / Renewable energy in Germany / Electricity sector in Iraq / Energy / Renewable energy / Feed-in tariff

ELECTRICITY Chapter 5 Electricity Key points •

Add to Reading List

Source URL: webarchive.nationalarchives.gov.uk

Language: English
135Ballets Russes dancers / Ballets Russes choreographers / Danseurs / Ballet teachers / Adolph Bolm / Ballets Russes / Ruth Page / Apollo / Sergei Diaghilev / Ballet / Dance / Ballet choreographers

Adolph Bolmby Judy Estey Adolph Bolm was a key member of the Russian emigré generation in early-twentieth-century America and contributed to its influence on the development of American ballet. Bolm

Add to Reading List

Source URL: danceheritage.org

Language: English - Date: 2012-10-31 19:44:13
136Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
137Electromagnetism / Renewable energy policy / Electric power transmission systems / Electrical grid / Distributed generation / Electricity meter / Net metering / Electric power / Energy / Electric power distribution

May 2013 – Edition 35 Welcome to the May edition of WIREDup. This newsletter includes an update on the introduction of Full Retail Contestability, provides key information for ECs and installers on solar connections, r

Add to Reading List

Source URL: www.tasnetworks.com.au

Language: English - Date: 2015-03-12 22:58:51
138Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:32
139Pseudorandom number generators / Information theory / Entropy / Random number generation / Key / Cryptographically secure pseudorandom number generator / Fortuna / Cryptography / Randomness / Thermodynamic entropy

On Randomness Version 0.1 Ben Laurie http://www.apache-ssl.org/ben.html December 29, 2004

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:33
140Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
UPDATE