Key generation

Results: 481



#Item
321Cryptographic protocols / Internet protocols / Internet standards / X.509 / Transport Layer Security / Public key infrastructure / Internet Engineering Task Force / HTTP Secure / Certificate authority / Cryptography / Public-key cryptography / Key management

1 Standardizing the Next Generation Public Key Infrastructure Incremental Improvements or Re-Design? Hannes Tschofenig∗ , Tobias Gondrom†

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 13:32:56
322Public-key cryptography / Pseudorandom number generators / Thermodynamic entropy / Entropy / Min-entropy / Key / Fortuna / Random number generation / RSA / Cryptography / Information theory / Randomness

Ensuring High-Quality Randomness in Cryptographic Key Generation arXiv:1309.7366v2 [cs.CR] 8 Jan[removed]Extended version)

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-01-08 22:29:07
323Next Generation 9-1-1 / Emergency medical services

Next Generation 9-1-1: WHAT’S NEXT? The right information to the right people at the right time Project Objective: Engage key public safety representatives to identify and prioritize data at NG9-1-1 public safety answe

Add to Reading List

Source URL: 911.gov

Language: English - Date: 2011-04-04 09:29:45
324Key / Manufacturing / Mechanical engineering / Technology / Metalworking / Screw / Woodworking

Generation II Stealth® Series RX Generation II Dimensions L C

Add to Reading List

Source URL: divapps.parker.com

Language: English - Date: 2014-06-27 12:44:07
325Computing / Content management systems / Information technology management / Business / Fortiva / Spam filtering / Anti-spam / Proofpoint /  Inc.

Proofpoint Enterprise Archive Industry Leading Cloud-Based Archiving Solution Proofpoint Enterprise Archive™ is a next generation archiving solution that addresses three key challenges—legal discovery, regulatory com

Add to Reading List

Source URL: www.proofpoint.com

Language: English - Date: 2012-10-09 14:30:30
326Sales / Virtual tradeshow / Web conferencing / Lead generation / Business / Marketing / Personal selling

WEB SEMINARS When you want to attract high-quality attendees you can’t reach anywhere else. Your best prospects are individuals who are actively looking for solutions and education – the key principle that makes web

Add to Reading List

Source URL: pentonmarketing.com

Language: English - Date: 2014-09-08 12:55:53
327Chalkboard Project / Education in Oregon / Pennsylvania

WORKGROUP ON FUNDING AND ACCOUNTABILITY FINAL REPORT: KEY FINDINGS An effective public K-12 education system is an integral component of a successful society. How and what each generation of students learns affects every

Add to Reading List

Source URL: chalkboardproject.org

Language: English - Date: 2014-08-10 23:54:32
328Pseudorandom number generators / Cryptographic hash function / Hashing / RdRand / Entropy / Random number generation / NIST hash function competition / AES instruction set / Key management / Cryptography / Randomness / Information theory

Intel and Random Numbers David Johnston [removed] NIST Random Number Workshop Inconvenient Truths

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:42:38
329Earth / Air pollution / Electric power / Emissions & Generation Resource Integrated Database / Energy in the United States / Renewable energy / Greenhouse gas emissions by the United States / American Clean Energy and Security Act / Environment / Climate change policy / Low-carbon economy

Contact: Stacy Tellinghuisen (Colorado), ([removed]Steve Michel (New Mexico, Nevada), ([removed]Bob Johnston (Nevada), ([removed]Key Western States Are Well-Positioned

Add to Reading List

Source URL: www.westernresourceadvocates.org

Language: English - Date: 2014-07-29 13:42:29
330Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE